Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-47814 (GCVE-0-2024-47814)
Vulnerability from cvelistv5
Published
2024-10-07 21:16
Modified
2025-04-11 22:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47814", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T14:12:43.174675Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-08T14:12:51.349Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-04-11T22:03:20.262Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20250411-0009/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "vim", "vendor": "vim", "versions": [ { "status": "affected", "version": "\u003c v9.1.0764" } ] } ], "descriptions": [ { "lang": "en", "value": "Vim is an open source, command line text editor. A use-after-free was found in Vim \u003c 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-07T21:16:01.796Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg" }, { "name": "https://github.com/vim/vim/commit/51b62387be93c65fa56bbabe1c3", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/vim/vim/commit/51b62387be93c65fa56bbabe1c3" } ], "source": { "advisory": "GHSA-rj48-v4mq-j4vg", "discovery": "UNKNOWN" }, "title": "use-after-free when closing buffers in Vim" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-47814", "datePublished": "2024-10-07T21:16:01.796Z", "dateReserved": "2024-10-03T14:06:12.637Z", "dateUpdated": "2025-04-11T22:03:20.262Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-47814\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-10-07T22:15:03.657\",\"lastModified\":\"2025-08-18T17:08:13.370\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vim is an open source, command line text editor. A use-after-free was found in Vim \u003c 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\"},{\"lang\":\"es\",\"value\":\"Vim es un editor de texto de l\u00ednea de comandos de c\u00f3digo abierto. Se encontr\u00f3 un Use After Free en Vim anterior a la versi\u00f3n 9.1.0764. Al cerrar un b\u00fafer (visible en una ventana), un comando autom\u00e1tico BufWinLeave puede provocar un Use After Free si este comando autom\u00e1tico vuelve a abrir el mismo b\u00fafer en una nueva ventana dividida. El impacto es bajo, ya que el usuario debe haber configurado intencionalmente un comando autom\u00e1tico tan extra\u00f1o y haber ejecutado algunos comandos de descarga de b\u00fafer. Sin embargo, esto puede provocar un bloqueo. Este problema se ha solucionado en la versi\u00f3n 9.1.0764 y se recomienda a todos los usuarios que actualicen. No existen workarounds conocidas para esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L\",\"baseScore\":3.9,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.3,\"impactScore\":2.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0764\",\"matchCriteriaId\":\"AA95E64D-199E-4374-9712-924E31696034\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"}]}]}],\"references\":[{\"url\":\"https://github.com/vim/vim/commit/51b62387be93c65fa56bbabe1c3\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20250411-0009/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20250411-0009/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-04-11T22:03:20.262Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-47814\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-08T14:12:43.174675Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-08T14:12:47.208Z\"}}], \"cna\": {\"title\": \"use-after-free when closing buffers in Vim\", \"source\": {\"advisory\": \"GHSA-rj48-v4mq-j4vg\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 3.9, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"vim\", \"product\": \"vim\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c v9.1.0764\"}]}], \"references\": [{\"url\": \"https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg\", \"name\": \"https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/vim/vim/commit/51b62387be93c65fa56bbabe1c3\", \"name\": \"https://github.com/vim/vim/commit/51b62387be93c65fa56bbabe1c3\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Vim is an open source, command line text editor. A use-after-free was found in Vim \u003c 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416: Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-10-07T21:16:01.796Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-47814\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-11T22:03:20.262Z\", \"dateReserved\": \"2024-10-03T14:06:12.637Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-10-07T21:16:01.796Z\", \"assignerShortName\": \"GitHub_M\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
fkie_cve-2024-47814
Vulnerability from fkie_nvd
Published
2024-10-07 22:15
Modified
2025-08-18 17:08
Severity ?
3.9 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
4.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
4.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
Vim is an open source, command line text editor. A use-after-free was found in Vim < 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vim | vim | * | |
netapp | bootstrap_os | - | |
netapp | hci_compute_node | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA95E64D-199E-4374-9712-924E31696034", "versionEndExcluding": "9.1.0764", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vim is an open source, command line text editor. A use-after-free was found in Vim \u003c 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability." }, { "lang": "es", "value": "Vim es un editor de texto de l\u00ednea de comandos de c\u00f3digo abierto. Se encontr\u00f3 un Use After Free en Vim anterior a la versi\u00f3n 9.1.0764. Al cerrar un b\u00fafer (visible en una ventana), un comando autom\u00e1tico BufWinLeave puede provocar un Use After Free si este comando autom\u00e1tico vuelve a abrir el mismo b\u00fafer en una nueva ventana dividida. El impacto es bajo, ya que el usuario debe haber configurado intencionalmente un comando autom\u00e1tico tan extra\u00f1o y haber ejecutado algunos comandos de descarga de b\u00fafer. Sin embargo, esto puede provocar un bloqueo. Este problema se ha solucionado en la versi\u00f3n 9.1.0764 y se recomienda a todos los usuarios que actualicen. No existen workarounds conocidas para esta vulnerabilidad." } ], "id": "CVE-2024-47814", "lastModified": "2025-08-18T17:08:13.370", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 2.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-10-07T22:15:03.657", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/vim/vim/commit/51b62387be93c65fa56bbabe1c3" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20250411-0009/" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "security-advisories@github.com", "type": "Secondary" } ] }
wid-sec-w-2024-3097
Vulnerability from csaf_certbund
Published
2024-10-07 22:00
Modified
2024-12-23 23:00
Summary
vim: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in vim ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "niedrig" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann eine Schwachstelle in vim ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3097 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3097.json" }, { "category": "self", "summary": "WID-SEC-2024-3097 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3097" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-10-07", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317096" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-10-07", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47814" }, { "category": "external", "summary": "GitHub Database", "url": "https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7131-1 vom 2024-11-27", "url": "https://ubuntu.com/security/notices/USN-7131-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4330-1 vom 2024-12-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020004.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4409-1 vom 2024-12-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020043.html" } ], "source_lang": "en-US", "title": "vim: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2024-12-23T23:00:00.000+00:00", "generator": { "date": "2024-12-24T10:02:24.574+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-3097", "initial_release_date": "2024-10-07T22:00:00.000+00:00", "revision_history": [ { "date": "2024-10-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-23T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.1.0764", "product": { "name": "Open Source vim \u003c9.1.0764", "product_id": "T038018" } }, { "category": "product_version", "name": "9.1.0764", "product": { "name": "Open Source vim 9.1.0764", "product_id": "T038018-fixed", "product_identification_helper": { "cpe": "cpe:/a:vim:vim:9.1.0764" } } } ], "category": "product_name", "name": "vim" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47814", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in vim. Dieser Fehler existiert wegen des BufWinLeave auto-Befehls, der einen Use-after-free verursacht. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen. F\u00fcr eine erfolgreiche Ausnutzung muss der Angreifer den auto-Befehl einrichten und einige Pufferentladebefehle ausf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T000126", "T038018" ] }, "release_date": "2024-10-07T22:00:00.000+00:00", "title": "CVE-2024-47814" } ] }
WID-SEC-W-2024-3097
Vulnerability from csaf_certbund
Published
2024-10-07 22:00
Modified
2024-12-23 23:00
Summary
vim: Schwachstelle ermöglicht Denial of Service
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in vim ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "niedrig" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann eine Schwachstelle in vim ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3097 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3097.json" }, { "category": "self", "summary": "WID-SEC-2024-3097 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3097" }, { "category": "external", "summary": "Red Hat Bugzilla vom 2024-10-07", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317096" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-10-07", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47814" }, { "category": "external", "summary": "GitHub Database", "url": "https://github.com/vim/vim/security/advisories/GHSA-rj48-v4mq-j4vg" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7131-1 vom 2024-11-27", "url": "https://ubuntu.com/security/notices/USN-7131-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4330-1 vom 2024-12-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020004.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4409-1 vom 2024-12-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020043.html" } ], "source_lang": "en-US", "title": "vim: Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2024-12-23T23:00:00.000+00:00", "generator": { "date": "2024-12-24T10:02:24.574+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-3097", "initial_release_date": "2024-10-07T22:00:00.000+00:00", "revision_history": [ { "date": "2024-10-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-23T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.1.0764", "product": { "name": "Open Source vim \u003c9.1.0764", "product_id": "T038018" } }, { "category": "product_version", "name": "9.1.0764", "product": { "name": "Open Source vim 9.1.0764", "product_id": "T038018-fixed", "product_identification_helper": { "cpe": "cpe:/a:vim:vim:9.1.0764" } } } ], "category": "product_name", "name": "vim" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-47814", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in vim. Dieser Fehler existiert wegen des BufWinLeave auto-Befehls, der einen Use-after-free verursacht. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen. F\u00fcr eine erfolgreiche Ausnutzung muss der Angreifer den auto-Befehl einrichten und einige Pufferentladebefehle ausf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T000126", "T038018" ] }, "release_date": "2024-10-07T22:00:00.000+00:00", "title": "CVE-2024-47814" } ] }
suse-su-2024:4409-1
Vulnerability from csaf_suse
Published
2024-12-23 09:20
Modified
2024-12-23 09:20
Summary
Recommended update for vim
Notes
Title of the patch
Recommended update for vim
Description of the patch
This update for vim fixes the following issues:
- CVE-2024-47814: Fixed use-after-free when closing buffers in Vim (bsc#1231373)
- CVE-2024-43374: Fixed use-after-free in alist_add() (bsc#1229238)
Other fixes:
- Remove patch that introduced a bug caused significantly more CPU usage (bsc#1220618)
- Updated to version 9.1.0836
Patchnames
SUSE-2024-4409,SUSE-SLE-SERVER-12-SP5-LTSS-2024-4409,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4409
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Recommended update for vim", "title": "Title of the patch" }, { "category": "description", "text": "This update for vim fixes the following issues:\n\n- CVE-2024-47814: Fixed use-after-free when closing buffers in Vim (bsc#1231373)\n- CVE-2024-43374: Fixed use-after-free in alist_add() (bsc#1229238)\n\nOther fixes:\n\n- Remove patch that introduced a bug caused significantly more CPU usage (bsc#1220618)\n- Updated to version 9.1.0836\n \n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-4409,SUSE-SLE-SERVER-12-SP5-LTSS-2024-4409,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4409", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_4409-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:4409-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20244409-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:4409-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020043.html" }, { "category": "self", "summary": "SUSE Bug 1220618", "url": "https://bugzilla.suse.com/1220618" }, { "category": "self", "summary": "SUSE Bug 1229238", "url": "https://bugzilla.suse.com/1229238" }, { "category": "self", "summary": "SUSE Bug 1231373", "url": "https://bugzilla.suse.com/1231373" }, { "category": "self", "summary": "SUSE CVE CVE-2024-43374 page", "url": "https://www.suse.com/security/cve/CVE-2024-43374/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-47814 page", "url": "https://www.suse.com/security/cve/CVE-2024-47814/" } ], "title": "Recommended update for vim", "tracking": { "current_release_date": "2024-12-23T09:20:49Z", "generator": { "date": "2024-12-23T09:20:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:4409-1", "initial_release_date": "2024-12-23T09:20:49Z", "revision_history": [ { "date": "2024-12-23T09:20:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "gvim-9.1.0836-17.38.1.aarch64", "product": { "name": "gvim-9.1.0836-17.38.1.aarch64", "product_id": "gvim-9.1.0836-17.38.1.aarch64" } }, { "category": "product_version", "name": "vim-9.1.0836-17.38.1.aarch64", "product": { "name": "vim-9.1.0836-17.38.1.aarch64", "product_id": "vim-9.1.0836-17.38.1.aarch64" } }, { "category": "product_version", "name": "vim-small-9.1.0836-17.38.1.aarch64", "product": { "name": "vim-small-9.1.0836-17.38.1.aarch64", "product_id": "vim-small-9.1.0836-17.38.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "gvim-9.1.0836-17.38.1.i586", "product": { "name": "gvim-9.1.0836-17.38.1.i586", "product_id": "gvim-9.1.0836-17.38.1.i586" } }, { "category": "product_version", "name": "vim-9.1.0836-17.38.1.i586", "product": { "name": "vim-9.1.0836-17.38.1.i586", "product_id": "vim-9.1.0836-17.38.1.i586" } }, { "category": "product_version", "name": "vim-small-9.1.0836-17.38.1.i586", "product": { "name": "vim-small-9.1.0836-17.38.1.i586", "product_id": "vim-small-9.1.0836-17.38.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "vim-data-9.1.0836-17.38.1.noarch", "product": { "name": "vim-data-9.1.0836-17.38.1.noarch", "product_id": "vim-data-9.1.0836-17.38.1.noarch" } }, { "category": "product_version", "name": "vim-data-common-9.1.0836-17.38.1.noarch", "product": { "name": "vim-data-common-9.1.0836-17.38.1.noarch", "product_id": "vim-data-common-9.1.0836-17.38.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "gvim-9.1.0836-17.38.1.ppc64le", "product": { "name": "gvim-9.1.0836-17.38.1.ppc64le", "product_id": "gvim-9.1.0836-17.38.1.ppc64le" } }, { "category": "product_version", "name": "vim-9.1.0836-17.38.1.ppc64le", "product": { "name": "vim-9.1.0836-17.38.1.ppc64le", "product_id": "vim-9.1.0836-17.38.1.ppc64le" } }, { "category": "product_version", "name": "vim-small-9.1.0836-17.38.1.ppc64le", "product": { "name": "vim-small-9.1.0836-17.38.1.ppc64le", "product_id": "vim-small-9.1.0836-17.38.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "gvim-9.1.0836-17.38.1.s390", "product": { "name": "gvim-9.1.0836-17.38.1.s390", "product_id": "gvim-9.1.0836-17.38.1.s390" } }, { "category": "product_version", "name": "vim-9.1.0836-17.38.1.s390", "product": { "name": "vim-9.1.0836-17.38.1.s390", "product_id": "vim-9.1.0836-17.38.1.s390" } }, { "category": "product_version", "name": "vim-small-9.1.0836-17.38.1.s390", "product": { "name": "vim-small-9.1.0836-17.38.1.s390", "product_id": "vim-small-9.1.0836-17.38.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "gvim-9.1.0836-17.38.1.s390x", "product": { "name": "gvim-9.1.0836-17.38.1.s390x", "product_id": "gvim-9.1.0836-17.38.1.s390x" } }, { "category": "product_version", "name": "vim-9.1.0836-17.38.1.s390x", "product": { "name": "vim-9.1.0836-17.38.1.s390x", "product_id": "vim-9.1.0836-17.38.1.s390x" } }, { "category": "product_version", "name": "vim-small-9.1.0836-17.38.1.s390x", "product": { "name": "vim-small-9.1.0836-17.38.1.s390x", "product_id": "vim-small-9.1.0836-17.38.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gvim-9.1.0836-17.38.1.x86_64", "product": { "name": "gvim-9.1.0836-17.38.1.x86_64", "product_id": "gvim-9.1.0836-17.38.1.x86_64" } }, { "category": "product_version", "name": "vim-9.1.0836-17.38.1.x86_64", "product": { "name": "vim-9.1.0836-17.38.1.x86_64", "product_id": "vim-9.1.0836-17.38.1.x86_64" } }, { "category": "product_version", "name": "vim-small-9.1.0836-17.38.1.x86_64", "product": { "name": "vim-small-9.1.0836-17.38.1.x86_64", "product_id": "vim-small-9.1.0836-17.38.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product": { "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-17.38.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.aarch64" }, "product_reference": "gvim-9.1.0836-17.38.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-17.38.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.ppc64le" }, "product_reference": "gvim-9.1.0836-17.38.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-17.38.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.s390x" }, "product_reference": "gvim-9.1.0836-17.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-17.38.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.x86_64" }, "product_reference": "gvim-9.1.0836-17.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-17.38.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.aarch64" }, "product_reference": "vim-9.1.0836-17.38.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-17.38.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.ppc64le" }, "product_reference": "vim-9.1.0836-17.38.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-17.38.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.s390x" }, "product_reference": "vim-9.1.0836-17.38.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-17.38.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.x86_64" }, "product_reference": "vim-9.1.0836-17.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "vim-data-9.1.0836-17.38.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-9.1.0836-17.38.1.noarch" }, "product_reference": "vim-data-9.1.0836-17.38.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "vim-data-common-9.1.0836-17.38.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-common-9.1.0836-17.38.1.noarch" }, "product_reference": "vim-data-common-9.1.0836-17.38.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-17.38.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.0836-17.38.1.x86_64" }, "product_reference": "gvim-9.1.0836-17.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-17.38.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.0836-17.38.1.x86_64" }, "product_reference": "vim-9.1.0836-17.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-data-9.1.0836-17.38.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.0836-17.38.1.noarch" }, "product_reference": "vim-data-9.1.0836-17.38.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-data-common-9.1.0836-17.38.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.0836-17.38.1.noarch" }, "product_reference": "vim-data-common-9.1.0836-17.38.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-43374", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-43374" } ], "notes": [ { "category": "general", "text": "The UNIX editor Vim prior to version 9.1.0678 has a use-after-free error in argument list handling. When adding a new file to the argument list, this triggers `Buf*` autocommands. If in such an autocommand the buffer that was just opened is closed (including the window where it is shown), this causes the window structure to be freed which contains a reference to the argument list that we are actually modifying. Once the autocommands are completed, the references to the window and argument list are no longer valid and as such cause an use-after-free. Impact is low since the user must either intentionally add some unusual autocommands that wipe a buffer during creation (either manually or by sourcing a malicious plugin), but it will crash Vim. The issue has been fixed as of Vim patch v9.1.0678.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-common-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.0836-17.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-43374", "url": "https://www.suse.com/security/cve/CVE-2024-43374" }, { "category": "external", "summary": "SUSE Bug 1229238 for CVE-2024-43374", "url": "https://bugzilla.suse.com/1229238" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-common-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.0836-17.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-common-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.0836-17.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-12-23T09:20:49Z", "details": "moderate" } ], "title": "CVE-2024-43374" }, { "cve": "CVE-2024-47814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-47814" } ], "notes": [ { "category": "general", "text": "Vim is an open source, command line text editor. A use-after-free was found in Vim \u003c 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-common-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.0836-17.38.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-47814", "url": "https://www.suse.com/security/cve/CVE-2024-47814" }, { "category": "external", "summary": "SUSE Bug 1231373 for CVE-2024-47814", "url": "https://bugzilla.suse.com/1231373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-common-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.0836-17.38.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:gvim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:vim-data-common-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.0836-17.38.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.0836-17.38.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.0836-17.38.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-12-23T09:20:49Z", "details": "low" } ], "title": "CVE-2024-47814" } ] }
suse-su-2024:4330-1
Vulnerability from csaf_suse
Published
2024-12-16 13:17
Modified
2024-12-16 13:17
Summary
Security update for vim
Notes
Title of the patch
Security update for vim
Description of the patch
This update for vim fixes the following issues:
- CVE-2024-47814: Fixed use-after-free when closing buffers in Vim (bsc#1231373)
- CVE-2024-43374: Fixed use-after-free in alist_add() (bsc#1229238)
Other fixes:
- Updated to version 9.1.0836
Patchnames
SUSE-2024-4330,SUSE-SLE-Micro-5.5-2024-4330,SUSE-SLE-Module-Basesystem-15-SP5-2024-4330,SUSE-SLE-Module-Basesystem-15-SP6-2024-4330,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-4330,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4330,openSUSE-Leap-Micro-5.5-2024-4330,openSUSE-SLE-15.5-2024-4330,openSUSE-SLE-15.6-2024-4330
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for vim", "title": "Title of the patch" }, { "category": "description", "text": "This update for vim fixes the following issues:\n\n - CVE-2024-47814: Fixed use-after-free when closing buffers in Vim (bsc#1231373)\n - CVE-2024-43374: Fixed use-after-free in alist_add() (bsc#1229238)\n\nOther fixes:\n\n- Updated to version 9.1.0836\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-4330,SUSE-SLE-Micro-5.5-2024-4330,SUSE-SLE-Module-Basesystem-15-SP5-2024-4330,SUSE-SLE-Module-Basesystem-15-SP6-2024-4330,SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-4330,SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-4330,openSUSE-Leap-Micro-5.5-2024-4330,openSUSE-SLE-15.5-2024-4330,openSUSE-SLE-15.6-2024-4330", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_4330-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:4330-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20244330-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:4330-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020004.html" }, { "category": "self", "summary": "SUSE Bug 1229238", "url": "https://bugzilla.suse.com/1229238" }, { "category": "self", "summary": "SUSE Bug 1231373", "url": "https://bugzilla.suse.com/1231373" }, { "category": "self", "summary": "SUSE CVE CVE-2024-43374 page", "url": "https://www.suse.com/security/cve/CVE-2024-43374/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-47814 page", "url": "https://www.suse.com/security/cve/CVE-2024-47814/" } ], "title": "Security update for vim", "tracking": { "current_release_date": "2024-12-16T13:17:28Z", "generator": { "date": "2024-12-16T13:17:28Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:4330-1", "initial_release_date": "2024-12-16T13:17:28Z", "revision_history": [ { "date": "2024-12-16T13:17:28Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "gvim-9.1.0836-150500.20.15.1.aarch64", "product": { "name": "gvim-9.1.0836-150500.20.15.1.aarch64", "product_id": "gvim-9.1.0836-150500.20.15.1.aarch64" } }, { "category": "product_version", "name": "vim-9.1.0836-150500.20.15.1.aarch64", "product": { "name": "vim-9.1.0836-150500.20.15.1.aarch64", "product_id": "vim-9.1.0836-150500.20.15.1.aarch64" } }, { "category": "product_version", "name": "vim-small-9.1.0836-150500.20.15.1.aarch64", "product": { "name": "vim-small-9.1.0836-150500.20.15.1.aarch64", "product_id": "vim-small-9.1.0836-150500.20.15.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "gvim-9.1.0836-150500.20.15.1.i586", "product": { "name": "gvim-9.1.0836-150500.20.15.1.i586", "product_id": "gvim-9.1.0836-150500.20.15.1.i586" } }, { "category": "product_version", "name": "vim-9.1.0836-150500.20.15.1.i586", "product": { "name": "vim-9.1.0836-150500.20.15.1.i586", "product_id": "vim-9.1.0836-150500.20.15.1.i586" } }, { "category": "product_version", "name": "vim-small-9.1.0836-150500.20.15.1.i586", "product": { "name": "vim-small-9.1.0836-150500.20.15.1.i586", "product_id": "vim-small-9.1.0836-150500.20.15.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "vim-data-9.1.0836-150500.20.15.1.noarch", "product": { "name": "vim-data-9.1.0836-150500.20.15.1.noarch", "product_id": "vim-data-9.1.0836-150500.20.15.1.noarch" } }, { "category": "product_version", "name": "vim-data-common-9.1.0836-150500.20.15.1.noarch", "product": { "name": "vim-data-common-9.1.0836-150500.20.15.1.noarch", "product_id": "vim-data-common-9.1.0836-150500.20.15.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "gvim-9.1.0836-150500.20.15.1.ppc64le", "product": { "name": "gvim-9.1.0836-150500.20.15.1.ppc64le", "product_id": "gvim-9.1.0836-150500.20.15.1.ppc64le" } }, { "category": "product_version", "name": "vim-9.1.0836-150500.20.15.1.ppc64le", "product": { "name": "vim-9.1.0836-150500.20.15.1.ppc64le", "product_id": "vim-9.1.0836-150500.20.15.1.ppc64le" } }, { "category": "product_version", "name": "vim-small-9.1.0836-150500.20.15.1.ppc64le", "product": { "name": "vim-small-9.1.0836-150500.20.15.1.ppc64le", "product_id": "vim-small-9.1.0836-150500.20.15.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "gvim-9.1.0836-150500.20.15.1.s390x", "product": { "name": "gvim-9.1.0836-150500.20.15.1.s390x", "product_id": "gvim-9.1.0836-150500.20.15.1.s390x" } }, { "category": "product_version", "name": "vim-9.1.0836-150500.20.15.1.s390x", "product": { "name": "vim-9.1.0836-150500.20.15.1.s390x", "product_id": "vim-9.1.0836-150500.20.15.1.s390x" } }, { "category": "product_version", "name": "vim-small-9.1.0836-150500.20.15.1.s390x", "product": { "name": "vim-small-9.1.0836-150500.20.15.1.s390x", "product_id": "vim-small-9.1.0836-150500.20.15.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gvim-9.1.0836-150500.20.15.1.x86_64", "product": { "name": "gvim-9.1.0836-150500.20.15.1.x86_64", "product_id": "gvim-9.1.0836-150500.20.15.1.x86_64" } }, { "category": "product_version", "name": "vim-9.1.0836-150500.20.15.1.x86_64", "product": { "name": "vim-9.1.0836-150500.20.15.1.x86_64", "product_id": "vim-9.1.0836-150500.20.15.1.x86_64" } }, { "category": "product_version", "name": "vim-small-9.1.0836-150500.20.15.1.x86_64", "product": { "name": "vim-small-9.1.0836-150500.20.15.1.x86_64", "product_id": "vim-small-9.1.0836-150500.20.15.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-desktop-applications:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-desktop-applications:15:sp6" } } }, { "category": "product_name", "name": "openSUSE Leap Micro 5.5", "product": { "name": "openSUSE Leap Micro 5.5", "product_id": "openSUSE Leap Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "vim-data-common-9.1.0836-150500.20.15.1.noarch as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.0836-150500.20.15.1.noarch" }, "product_reference": "vim-data-common-9.1.0836-150500.20.15.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.aarch64" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.ppc64le" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.s390x as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.s390x" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.x86_64" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-150500.20.15.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.aarch64" }, "product_reference": "vim-9.1.0836-150500.20.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-150500.20.15.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.ppc64le" }, "product_reference": "vim-9.1.0836-150500.20.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-150500.20.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.s390x" }, "product_reference": "vim-9.1.0836-150500.20.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-150500.20.15.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.x86_64" }, "product_reference": "vim-9.1.0836-150500.20.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-data-9.1.0836-150500.20.15.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-data-9.1.0836-150500.20.15.1.noarch" }, "product_reference": "vim-data-9.1.0836-150500.20.15.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-data-common-9.1.0836-150500.20.15.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-data-common-9.1.0836-150500.20.15.1.noarch" }, "product_reference": "vim-data-common-9.1.0836-150500.20.15.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.aarch64" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.ppc64le" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.s390x" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.x86_64" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-150500.20.15.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.aarch64" }, "product_reference": "vim-9.1.0836-150500.20.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-150500.20.15.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.ppc64le" }, "product_reference": "vim-9.1.0836-150500.20.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-150500.20.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.s390x" }, "product_reference": "vim-9.1.0836-150500.20.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-150500.20.15.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.x86_64" }, "product_reference": "vim-9.1.0836-150500.20.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-data-9.1.0836-150500.20.15.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.0836-150500.20.15.1.noarch" }, "product_reference": "vim-data-9.1.0836-150500.20.15.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-data-common-9.1.0836-150500.20.15.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.0836-150500.20.15.1.noarch" }, "product_reference": "vim-data-common-9.1.0836-150500.20.15.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.aarch64" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.ppc64le" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.s390x" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.x86_64" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-150500.20.15.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.aarch64" }, "product_reference": "gvim-9.1.0836-150500.20.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-150500.20.15.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.ppc64le" }, "product_reference": "gvim-9.1.0836-150500.20.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-150500.20.15.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.s390x" }, "product_reference": "gvim-9.1.0836-150500.20.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-150500.20.15.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP5", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.x86_64" }, "product_reference": "gvim-9.1.0836-150500.20.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-150500.20.15.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.aarch64" }, "product_reference": "gvim-9.1.0836-150500.20.15.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-150500.20.15.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.ppc64le" }, "product_reference": "gvim-9.1.0836-150500.20.15.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-150500.20.15.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.s390x" }, "product_reference": "gvim-9.1.0836-150500.20.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-150500.20.15.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.x86_64" }, "product_reference": "gvim-9.1.0836-150500.20.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-data-common-9.1.0836-150500.20.15.1.noarch as component of openSUSE Leap Micro 5.5", "product_id": "openSUSE Leap Micro 5.5:vim-data-common-9.1.0836-150500.20.15.1.noarch" }, "product_reference": "vim-data-common-9.1.0836-150500.20.15.1.noarch", "relates_to_product_reference": "openSUSE Leap Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.aarch64 as component of openSUSE Leap Micro 5.5", "product_id": "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.aarch64" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.aarch64", "relates_to_product_reference": "openSUSE Leap Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.s390x as component of openSUSE Leap Micro 5.5", "product_id": "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.s390x" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.s390x", "relates_to_product_reference": "openSUSE Leap Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.x86_64 as component of openSUSE Leap Micro 5.5", "product_id": "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.x86_64" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-150500.20.15.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.aarch64" }, "product_reference": "gvim-9.1.0836-150500.20.15.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-150500.20.15.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.ppc64le" }, "product_reference": "gvim-9.1.0836-150500.20.15.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-150500.20.15.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.s390x" }, "product_reference": "gvim-9.1.0836-150500.20.15.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-150500.20.15.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.x86_64" }, "product_reference": "gvim-9.1.0836-150500.20.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-150500.20.15.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.aarch64" }, "product_reference": "vim-9.1.0836-150500.20.15.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-150500.20.15.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.ppc64le" }, "product_reference": "vim-9.1.0836-150500.20.15.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-150500.20.15.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.s390x" }, "product_reference": "vim-9.1.0836-150500.20.15.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-150500.20.15.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.x86_64" }, "product_reference": "vim-9.1.0836-150500.20.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-data-9.1.0836-150500.20.15.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:vim-data-9.1.0836-150500.20.15.1.noarch" }, "product_reference": "vim-data-9.1.0836-150500.20.15.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-data-common-9.1.0836-150500.20.15.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:vim-data-common-9.1.0836-150500.20.15.1.noarch" }, "product_reference": "vim-data-common-9.1.0836-150500.20.15.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.aarch64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.aarch64" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.ppc64le as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.ppc64le" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.s390x as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.s390x" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.x86_64 as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.x86_64" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-150500.20.15.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.aarch64" }, "product_reference": "gvim-9.1.0836-150500.20.15.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-150500.20.15.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.ppc64le" }, "product_reference": "gvim-9.1.0836-150500.20.15.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-150500.20.15.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.s390x" }, "product_reference": "gvim-9.1.0836-150500.20.15.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "gvim-9.1.0836-150500.20.15.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.x86_64" }, "product_reference": "gvim-9.1.0836-150500.20.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-150500.20.15.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.aarch64" }, "product_reference": "vim-9.1.0836-150500.20.15.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-150500.20.15.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.ppc64le" }, "product_reference": "vim-9.1.0836-150500.20.15.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-150500.20.15.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.s390x" }, "product_reference": "vim-9.1.0836-150500.20.15.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-9.1.0836-150500.20.15.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.x86_64" }, "product_reference": "vim-9.1.0836-150500.20.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-data-9.1.0836-150500.20.15.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:vim-data-9.1.0836-150500.20.15.1.noarch" }, "product_reference": "vim-data-9.1.0836-150500.20.15.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-data-common-9.1.0836-150500.20.15.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:vim-data-common-9.1.0836-150500.20.15.1.noarch" }, "product_reference": "vim-data-common-9.1.0836-150500.20.15.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.aarch64" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.ppc64le" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.s390x" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "vim-small-9.1.0836-150500.20.15.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.x86_64" }, "product_reference": "vim-small-9.1.0836-150500.20.15.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-43374", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-43374" } ], "notes": [ { "category": "general", "text": "The UNIX editor Vim prior to version 9.1.0678 has a use-after-free error in argument list handling. When adding a new file to the argument list, this triggers `Buf*` autocommands. If in such an autocommand the buffer that was just opened is closed (including the window where it is shown), this causes the window structure to be freed which contains a reference to the argument list that we are actually modifying. Once the autocommands are completed, the references to the window and argument list are no longer valid and as such cause an use-after-free. Impact is low since the user must either intentionally add some unusual autocommands that wipe a buffer during creation (either manually or by sourcing a malicious plugin), but it will crash Vim. The issue has been fixed as of Vim patch v9.1.0678.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-data-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:vim-data-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:vim-data-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.6:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap Micro 5.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-43374", "url": "https://www.suse.com/security/cve/CVE-2024-43374" }, { "category": "external", "summary": "SUSE Bug 1229238 for CVE-2024-43374", "url": "https://bugzilla.suse.com/1229238" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-data-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:vim-data-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:vim-data-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.6:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap Micro 5.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-data-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:vim-data-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:vim-data-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.6:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap Micro 5.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-12-16T13:17:28Z", "details": "moderate" } ], "title": "CVE-2024-43374" }, { "cve": "CVE-2024-47814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-47814" } ], "notes": [ { "category": "general", "text": "Vim is an open source, command line text editor. A use-after-free was found in Vim \u003c 9.1.0764. When closing a buffer (visible in a window) a BufWinLeave auto command can cause an use-after-free if this auto command happens to re-open the same buffer in a new split window. Impact is low since the user must have intentionally set up such a strange auto command and run some buffer unload commands. However this may lead to a crash. This issue has been addressed in version 9.1.0764 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-data-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:vim-data-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:vim-data-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.6:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap Micro 5.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-47814", "url": "https://www.suse.com/security/cve/CVE-2024-47814" }, { "category": "external", "summary": "SUSE Bug 1231373 for CVE-2024-47814", "url": "https://bugzilla.suse.com/1231373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-data-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:vim-data-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:vim-data-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.6:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap Micro 5.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-data-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP5:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.0836-150500.20.15.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP5:gvim-9.1.0836-150500.20.15.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:vim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.5:vim-data-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.5:vim-small-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:gvim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:vim-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap 15.6:vim-data-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.6:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.ppc64le", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap 15.6:vim-small-9.1.0836-150500.20.15.1.x86_64", "openSUSE Leap Micro 5.5:vim-data-common-9.1.0836-150500.20.15.1.noarch", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.aarch64", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.s390x", "openSUSE Leap Micro 5.5:vim-small-9.1.0836-150500.20.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-12-16T13:17:28Z", "details": "low" } ], "title": "CVE-2024-47814" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…