Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-53905 (GCVE-0-2025-53905)
Vulnerability from cvelistv5
Published
2025-07-15 20:48
Modified
2025-11-04 21:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim’s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.
References
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-53905",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-18T14:42:54.590938Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-18T14:42:58.540Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr"
}
],
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-04T21:12:41.157Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2025/07/15/1"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "vim",
"vendor": "vim",
"versions": [
{
"status": "affected",
"version": "\u003c 9.1.1552"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim\u2019s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-15T20:48:34.764Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr"
},
{
"name": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239"
}
],
"source": {
"advisory": "GHSA-74v4-f3x9-ppvr",
"discovery": "UNKNOWN"
},
"title": "Vim has path traversial issue with tar.vim and special crafted tar files"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-53905",
"datePublished": "2025-07-15T20:48:34.764Z",
"dateReserved": "2025-07-11T19:05:23.827Z",
"dateUpdated": "2025-11-04T21:12:41.157Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-53905\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-07-15T21:15:34.347\",\"lastModified\":\"2025-11-04T22:16:27.173\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim\u2019s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.\"},{\"lang\":\"es\",\"value\":\"Vim es un editor de texto de l\u00ednea de comandos de c\u00f3digo abierto. Antes de la versi\u00f3n 9.1.1552, un problema de path traversal en el complemento tar.vim de Vim permit\u00eda sobrescribir archivos arbitrarios al abrir archivos tar especialmente manipulados. El impacto es bajo, ya que esta vulnerabilidad requiere la interacci\u00f3n directa del usuario. Sin embargo, una explotaci\u00f3n exitosa puede provocar la sobrescritura de archivos confidenciales o la colocaci\u00f3n de c\u00f3digo ejecutable en ubicaciones privilegiadas, seg\u00fan los permisos del proceso que edita el archivo. La v\u00edctima debe editar dicho archivo con Vim, lo que revelar\u00e1 el nombre y el contenido del archivo; un usuario cuidadoso podr\u00eda sospechar que est\u00e1n ocurriendo cosas extra\u00f1as. Una explotaci\u00f3n exitosa podr\u00eda permitir la ejecuci\u00f3n de comandos arbitrarios en el sistema operativo subyacente. La versi\u00f3n 9.1.1552 contiene un parche para esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L\",\"baseScore\":4.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.0,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.1552\",\"matchCriteriaId\":\"FB04D6F6-A934-4796-B934-1684202DD6E7\"}]}]}],\"references\":[{\"url\":\"https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/07/15/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2025/07/15/1\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-04T21:12:41.157Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-53905\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-18T14:42:54.590938Z\"}}}], \"references\": [{\"url\": \"https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr\", \"tags\": [\"exploit\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-18T14:42:45.970Z\"}}], \"cna\": {\"title\": \"Vim has path traversial issue with tar.vim and special crafted tar files\", \"source\": {\"advisory\": \"GHSA-74v4-f3x9-ppvr\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 4.1, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"vim\", \"product\": \"vim\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 9.1.1552\"}]}], \"references\": [{\"url\": \"https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr\", \"name\": \"https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239\", \"name\": \"https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim\\u2019s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-22\", \"description\": \"CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-07-15T20:48:34.764Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-53905\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-04T21:12:41.157Z\", \"dateReserved\": \"2025-07-11T19:05:23.827Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-07-15T20:48:34.764Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
suse-su-2025:03240-1
Vulnerability from csaf_suse
Published
2025-09-16 19:57
Modified
2025-09-16 19:57
Summary
Security update for vim
Notes
Title of the patch
Security update for vim
Description of the patch
This update for vim fixes the following issues:
Update to version 9.1.1629.
- CVE-2025-53905: Fixed a path traversal issue in tar.vim plugin that may allow for file overwriting when opening
specially crafted tar files (bsc#1246604).
- CVE-2025-53906: Fixed a path traversal issue in zip.vim plugin that may allow for file overwriting when opening
specially crafted zip files (bsc#1246602).
- CVE-2025-55157: Fixed use-after-free in internal tuple reference management (bsc#1247938).
- CVE-2025-55158: Fixed double-free in internal typed value (typval_T) management (bsc#1247939).
Patchnames
SUSE-2025-3240,SUSE-SLE-Micro-5.3-2025-3240,SUSE-SLE-Micro-5.4-2025-3240,SUSE-SUSE-MicroOS-5.1-2025-3240,SUSE-SUSE-MicroOS-5.2-2025-3240
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for vim",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for vim fixes the following issues:\n\nUpdate to version 9.1.1629.\n \n- CVE-2025-53905: Fixed a path traversal issue in tar.vim plugin that may allow for file overwriting when opening\n specially crafted tar files (bsc#1246604).\n- CVE-2025-53906: Fixed a path traversal issue in zip.vim plugin that may allow for file overwriting when opening\n specially crafted zip files (bsc#1246602).\n- CVE-2025-55157: Fixed use-after-free in internal tuple reference management (bsc#1247938).\n- CVE-2025-55158: Fixed double-free in internal typed value (typval_T) management (bsc#1247939).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3240,SUSE-SLE-Micro-5.3-2025-3240,SUSE-SLE-Micro-5.4-2025-3240,SUSE-SUSE-MicroOS-5.1-2025-3240,SUSE-SUSE-MicroOS-5.2-2025-3240",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_03240-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:03240-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503240-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:03240-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-September/041716.html"
},
{
"category": "self",
"summary": "SUSE Bug 1246602",
"url": "https://bugzilla.suse.com/1246602"
},
{
"category": "self",
"summary": "SUSE Bug 1246604",
"url": "https://bugzilla.suse.com/1246604"
},
{
"category": "self",
"summary": "SUSE Bug 1247938",
"url": "https://bugzilla.suse.com/1247938"
},
{
"category": "self",
"summary": "SUSE Bug 1247939",
"url": "https://bugzilla.suse.com/1247939"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53905 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53905/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53906 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55158/"
}
],
"title": "Security update for vim",
"tracking": {
"current_release_date": "2025-09-16T19:57:09Z",
"generator": {
"date": "2025-09-16T19:57:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:03240-1",
"initial_release_date": "2025-09-16T19:57:09Z",
"revision_history": [
{
"date": "2025-09-16T19:57:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.1.1629-150000.5.78.1.aarch64",
"product": {
"name": "gvim-9.1.1629-150000.5.78.1.aarch64",
"product_id": "gvim-9.1.1629-150000.5.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "vim-9.1.1629-150000.5.78.1.aarch64",
"product": {
"name": "vim-9.1.1629-150000.5.78.1.aarch64",
"product_id": "vim-9.1.1629-150000.5.78.1.aarch64"
}
},
{
"category": "product_version",
"name": "vim-small-9.1.1629-150000.5.78.1.aarch64",
"product": {
"name": "vim-small-9.1.1629-150000.5.78.1.aarch64",
"product_id": "vim-small-9.1.1629-150000.5.78.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.1.1629-150000.5.78.1.i586",
"product": {
"name": "gvim-9.1.1629-150000.5.78.1.i586",
"product_id": "gvim-9.1.1629-150000.5.78.1.i586"
}
},
{
"category": "product_version",
"name": "vim-9.1.1629-150000.5.78.1.i586",
"product": {
"name": "vim-9.1.1629-150000.5.78.1.i586",
"product_id": "vim-9.1.1629-150000.5.78.1.i586"
}
},
{
"category": "product_version",
"name": "vim-small-9.1.1629-150000.5.78.1.i586",
"product": {
"name": "vim-small-9.1.1629-150000.5.78.1.i586",
"product_id": "vim-small-9.1.1629-150000.5.78.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-data-9.1.1629-150000.5.78.1.noarch",
"product": {
"name": "vim-data-9.1.1629-150000.5.78.1.noarch",
"product_id": "vim-data-9.1.1629-150000.5.78.1.noarch"
}
},
{
"category": "product_version",
"name": "vim-data-common-9.1.1629-150000.5.78.1.noarch",
"product": {
"name": "vim-data-common-9.1.1629-150000.5.78.1.noarch",
"product_id": "vim-data-common-9.1.1629-150000.5.78.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.1.1629-150000.5.78.1.ppc64le",
"product": {
"name": "gvim-9.1.1629-150000.5.78.1.ppc64le",
"product_id": "gvim-9.1.1629-150000.5.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "vim-9.1.1629-150000.5.78.1.ppc64le",
"product": {
"name": "vim-9.1.1629-150000.5.78.1.ppc64le",
"product_id": "vim-9.1.1629-150000.5.78.1.ppc64le"
}
},
{
"category": "product_version",
"name": "vim-small-9.1.1629-150000.5.78.1.ppc64le",
"product": {
"name": "vim-small-9.1.1629-150000.5.78.1.ppc64le",
"product_id": "vim-small-9.1.1629-150000.5.78.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.1.1629-150000.5.78.1.s390x",
"product": {
"name": "gvim-9.1.1629-150000.5.78.1.s390x",
"product_id": "gvim-9.1.1629-150000.5.78.1.s390x"
}
},
{
"category": "product_version",
"name": "vim-9.1.1629-150000.5.78.1.s390x",
"product": {
"name": "vim-9.1.1629-150000.5.78.1.s390x",
"product_id": "vim-9.1.1629-150000.5.78.1.s390x"
}
},
{
"category": "product_version",
"name": "vim-small-9.1.1629-150000.5.78.1.s390x",
"product": {
"name": "vim-small-9.1.1629-150000.5.78.1.s390x",
"product_id": "vim-small-9.1.1629-150000.5.78.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.1.1629-150000.5.78.1.x86_64",
"product": {
"name": "gvim-9.1.1629-150000.5.78.1.x86_64",
"product_id": "gvim-9.1.1629-150000.5.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "vim-9.1.1629-150000.5.78.1.x86_64",
"product": {
"name": "vim-9.1.1629-150000.5.78.1.x86_64",
"product_id": "vim-9.1.1629-150000.5.78.1.x86_64"
}
},
{
"category": "product_version",
"name": "vim-small-9.1.1629-150000.5.78.1.x86_64",
"product": {
"name": "vim-small-9.1.1629-150000.5.78.1.x86_64",
"product_id": "vim-small-9.1.1629-150000.5.78.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.1.1629-150000.5.78.1.noarch as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1.noarch"
},
"product_reference": "vim-data-common-9.1.1629-150000.5.78.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150000.5.78.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.aarch64"
},
"product_reference": "vim-small-9.1.1629-150000.5.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150000.5.78.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.s390x"
},
"product_reference": "vim-small-9.1.1629-150000.5.78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150000.5.78.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.x86_64"
},
"product_reference": "vim-small-9.1.1629-150000.5.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.1.1629-150000.5.78.1.noarch as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1.noarch"
},
"product_reference": "vim-data-common-9.1.1629-150000.5.78.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150000.5.78.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.aarch64"
},
"product_reference": "vim-small-9.1.1629-150000.5.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150000.5.78.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.s390x"
},
"product_reference": "vim-small-9.1.1629-150000.5.78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150000.5.78.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.x86_64"
},
"product_reference": "vim-small-9.1.1629-150000.5.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.1.1629-150000.5.78.1.noarch as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1.noarch"
},
"product_reference": "vim-data-common-9.1.1629-150000.5.78.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150000.5.78.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.aarch64"
},
"product_reference": "vim-small-9.1.1629-150000.5.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150000.5.78.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.s390x"
},
"product_reference": "vim-small-9.1.1629-150000.5.78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150000.5.78.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.x86_64"
},
"product_reference": "vim-small-9.1.1629-150000.5.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.1.1629-150000.5.78.1.noarch as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1.noarch"
},
"product_reference": "vim-data-common-9.1.1629-150000.5.78.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150000.5.78.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.aarch64"
},
"product_reference": "vim-small-9.1.1629-150000.5.78.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150000.5.78.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.s390x"
},
"product_reference": "vim-small-9.1.1629-150000.5.78.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150000.5.78.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.x86_64"
},
"product_reference": "vim-small-9.1.1629-150000.5.78.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53905"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim\u0027s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53905",
"url": "https://www.suse.com/security/cve/CVE-2025-53905"
},
{
"category": "external",
"summary": "SUSE Bug 1246604 for CVE-2025-53905",
"url": "https://bugzilla.suse.com/1246604"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-16T19:57:09Z",
"details": "moderate"
}
],
"title": "CVE-2025-53905"
},
{
"cve": "CVE-2025-53906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53906"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim\u0027s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53906",
"url": "https://www.suse.com/security/cve/CVE-2025-53906"
},
{
"category": "external",
"summary": "SUSE Bug 1246602 for CVE-2025-53906",
"url": "https://bugzilla.suse.com/1246602"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-16T19:57:09Z",
"details": "moderate"
}
],
"title": "CVE-2025-53906"
},
{
"cve": "CVE-2025-55157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55157"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim\u0027s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55157",
"url": "https://www.suse.com/security/cve/CVE-2025-55157"
},
{
"category": "external",
"summary": "SUSE Bug 1247938 for CVE-2025-55157",
"url": "https://bugzilla.suse.com/1247938"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-16T19:57:09Z",
"details": "moderate"
}
],
"title": "CVE-2025-55157"
},
{
"cve": "CVE-2025-55158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55158"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1406, when processing nested tuples during Vim9 script import operations, an error during evaluation can trigger a double-free in Vim\u0027s internal typed value (typval_T) management. Specifically, the clear_tv() function may attempt to free memory that has already been deallocated, due to improper lifetime handling in the handle_import / ex_import code paths. The vulnerability can only be triggered if a user explicitly opens and executes a specially crafted Vim script. This issue has been patched in version 9.1.1406.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55158",
"url": "https://www.suse.com/security/cve/CVE-2025-55158"
},
{
"category": "external",
"summary": "SUSE Bug 1247939 for CVE-2025-55158",
"url": "https://bugzilla.suse.com/1247939"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.1:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.2:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.3:vim-small-9.1.1629-150000.5.78.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:vim-data-common-9.1.1629-150000.5.78.1.noarch",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.s390x",
"SUSE Linux Enterprise Micro 5.4:vim-small-9.1.1629-150000.5.78.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-16T19:57:09Z",
"details": "moderate"
}
],
"title": "CVE-2025-55158"
}
]
}
suse-su-2025:03299-1
Vulnerability from csaf_suse
Published
2025-09-23 09:02
Modified
2025-09-23 09:02
Summary
Security update for vim
Notes
Title of the patch
Security update for vim
Description of the patch
This update for vim fixes the following issues:
Updated to 9.1.1629:
- CVE-2025-53905: Fixed malicious tar archive may causing a path traversal in Vim’s tar.vim plugin (bsc#1246604)
- CVE-2025-53906: Fixed malicious zip archive may causing a path traversal in Vim’s zip (bsc#1246602)
- CVE-2025-55157: Fixed use-after-free in internal tuple reference management (bsc#1247938)
- CVE-2025-55158: Fixed double-free in internal typed value (typval_T) management (bsc#1247939)
Patchnames
SUSE-2025-3299,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3299
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for vim",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for vim fixes the following issues:\n\nUpdated to 9.1.1629:\n- CVE-2025-53905: Fixed malicious tar archive may causing a path traversal in Vim\u2019s tar.vim plugin (bsc#1246604)\n- CVE-2025-53906: Fixed malicious zip archive may causing a path traversal in Vim\u2019s zip (bsc#1246602)\n- CVE-2025-55157: Fixed use-after-free in internal tuple reference management (bsc#1247938)\n- CVE-2025-55158: Fixed double-free in internal typed value (typval_T) management (bsc#1247939)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3299,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3299",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_03299-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:03299-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503299-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:03299-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-September/041804.html"
},
{
"category": "self",
"summary": "SUSE Bug 1246602",
"url": "https://bugzilla.suse.com/1246602"
},
{
"category": "self",
"summary": "SUSE Bug 1246604",
"url": "https://bugzilla.suse.com/1246604"
},
{
"category": "self",
"summary": "SUSE Bug 1247938",
"url": "https://bugzilla.suse.com/1247938"
},
{
"category": "self",
"summary": "SUSE Bug 1247939",
"url": "https://bugzilla.suse.com/1247939"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53905 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53905/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53906 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55158/"
}
],
"title": "Security update for vim",
"tracking": {
"current_release_date": "2025-09-23T09:02:41Z",
"generator": {
"date": "2025-09-23T09:02:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:03299-1",
"initial_release_date": "2025-09-23T09:02:41Z",
"revision_history": [
{
"date": "2025-09-23T09:02:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.1.1629-17.51.1.aarch64",
"product": {
"name": "gvim-9.1.1629-17.51.1.aarch64",
"product_id": "gvim-9.1.1629-17.51.1.aarch64"
}
},
{
"category": "product_version",
"name": "vim-9.1.1629-17.51.1.aarch64",
"product": {
"name": "vim-9.1.1629-17.51.1.aarch64",
"product_id": "vim-9.1.1629-17.51.1.aarch64"
}
},
{
"category": "product_version",
"name": "vim-small-9.1.1629-17.51.1.aarch64",
"product": {
"name": "vim-small-9.1.1629-17.51.1.aarch64",
"product_id": "vim-small-9.1.1629-17.51.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.1.1629-17.51.1.i586",
"product": {
"name": "gvim-9.1.1629-17.51.1.i586",
"product_id": "gvim-9.1.1629-17.51.1.i586"
}
},
{
"category": "product_version",
"name": "vim-9.1.1629-17.51.1.i586",
"product": {
"name": "vim-9.1.1629-17.51.1.i586",
"product_id": "vim-9.1.1629-17.51.1.i586"
}
},
{
"category": "product_version",
"name": "vim-small-9.1.1629-17.51.1.i586",
"product": {
"name": "vim-small-9.1.1629-17.51.1.i586",
"product_id": "vim-small-9.1.1629-17.51.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-data-9.1.1629-17.51.1.noarch",
"product": {
"name": "vim-data-9.1.1629-17.51.1.noarch",
"product_id": "vim-data-9.1.1629-17.51.1.noarch"
}
},
{
"category": "product_version",
"name": "vim-data-common-9.1.1629-17.51.1.noarch",
"product": {
"name": "vim-data-common-9.1.1629-17.51.1.noarch",
"product_id": "vim-data-common-9.1.1629-17.51.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.1.1629-17.51.1.ppc64le",
"product": {
"name": "gvim-9.1.1629-17.51.1.ppc64le",
"product_id": "gvim-9.1.1629-17.51.1.ppc64le"
}
},
{
"category": "product_version",
"name": "vim-9.1.1629-17.51.1.ppc64le",
"product": {
"name": "vim-9.1.1629-17.51.1.ppc64le",
"product_id": "vim-9.1.1629-17.51.1.ppc64le"
}
},
{
"category": "product_version",
"name": "vim-small-9.1.1629-17.51.1.ppc64le",
"product": {
"name": "vim-small-9.1.1629-17.51.1.ppc64le",
"product_id": "vim-small-9.1.1629-17.51.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.1.1629-17.51.1.s390",
"product": {
"name": "gvim-9.1.1629-17.51.1.s390",
"product_id": "gvim-9.1.1629-17.51.1.s390"
}
},
{
"category": "product_version",
"name": "vim-9.1.1629-17.51.1.s390",
"product": {
"name": "vim-9.1.1629-17.51.1.s390",
"product_id": "vim-9.1.1629-17.51.1.s390"
}
},
{
"category": "product_version",
"name": "vim-small-9.1.1629-17.51.1.s390",
"product": {
"name": "vim-small-9.1.1629-17.51.1.s390",
"product_id": "vim-small-9.1.1629-17.51.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.1.1629-17.51.1.s390x",
"product": {
"name": "gvim-9.1.1629-17.51.1.s390x",
"product_id": "gvim-9.1.1629-17.51.1.s390x"
}
},
{
"category": "product_version",
"name": "vim-9.1.1629-17.51.1.s390x",
"product": {
"name": "vim-9.1.1629-17.51.1.s390x",
"product_id": "vim-9.1.1629-17.51.1.s390x"
}
},
{
"category": "product_version",
"name": "vim-small-9.1.1629-17.51.1.s390x",
"product": {
"name": "vim-small-9.1.1629-17.51.1.s390x",
"product_id": "vim-small-9.1.1629-17.51.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.1.1629-17.51.1.x86_64",
"product": {
"name": "gvim-9.1.1629-17.51.1.x86_64",
"product_id": "gvim-9.1.1629-17.51.1.x86_64"
}
},
{
"category": "product_version",
"name": "vim-9.1.1629-17.51.1.x86_64",
"product": {
"name": "vim-9.1.1629-17.51.1.x86_64",
"product_id": "vim-9.1.1629-17.51.1.x86_64"
}
},
{
"category": "product_version",
"name": "vim-small-9.1.1629-17.51.1.x86_64",
"product": {
"name": "vim-small-9.1.1629-17.51.1.x86_64",
"product_id": "vim-small-9.1.1629-17.51.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.1.1629-17.51.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.1629-17.51.1.x86_64"
},
"product_reference": "gvim-9.1.1629-17.51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.1.1629-17.51.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.1629-17.51.1.x86_64"
},
"product_reference": "vim-9.1.1629-17.51.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-9.1.1629-17.51.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.1629-17.51.1.noarch"
},
"product_reference": "vim-data-9.1.1629-17.51.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.1.1629-17.51.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.1629-17.51.1.noarch"
},
"product_reference": "vim-data-common-9.1.1629-17.51.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53905"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim\u0027s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.1629-17.51.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.1629-17.51.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53905",
"url": "https://www.suse.com/security/cve/CVE-2025-53905"
},
{
"category": "external",
"summary": "SUSE Bug 1246604 for CVE-2025-53905",
"url": "https://bugzilla.suse.com/1246604"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.1629-17.51.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.1629-17.51.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.1629-17.51.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.1629-17.51.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T09:02:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-53905"
},
{
"cve": "CVE-2025-53906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53906"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim\u0027s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.1629-17.51.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.1629-17.51.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53906",
"url": "https://www.suse.com/security/cve/CVE-2025-53906"
},
{
"category": "external",
"summary": "SUSE Bug 1246602 for CVE-2025-53906",
"url": "https://bugzilla.suse.com/1246602"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.1629-17.51.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.1629-17.51.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.1629-17.51.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.1629-17.51.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T09:02:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-53906"
},
{
"cve": "CVE-2025-55157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55157"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim\u0027s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.1629-17.51.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.1629-17.51.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55157",
"url": "https://www.suse.com/security/cve/CVE-2025-55157"
},
{
"category": "external",
"summary": "SUSE Bug 1247938 for CVE-2025-55157",
"url": "https://bugzilla.suse.com/1247938"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.1629-17.51.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.1629-17.51.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.1629-17.51.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.1629-17.51.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T09:02:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-55157"
},
{
"cve": "CVE-2025-55158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55158"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1406, when processing nested tuples during Vim9 script import operations, an error during evaluation can trigger a double-free in Vim\u0027s internal typed value (typval_T) management. Specifically, the clear_tv() function may attempt to free memory that has already been deallocated, due to improper lifetime handling in the handle_import / ex_import code paths. The vulnerability can only be triggered if a user explicitly opens and executes a specially crafted Vim script. This issue has been patched in version 9.1.1406.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.1629-17.51.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.1629-17.51.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55158",
"url": "https://www.suse.com/security/cve/CVE-2025-55158"
},
{
"category": "external",
"summary": "SUSE Bug 1247939 for CVE-2025-55158",
"url": "https://bugzilla.suse.com/1247939"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.1629-17.51.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.1629-17.51.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gvim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-9.1.1629-17.51.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-9.1.1629-17.51.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:vim-data-common-9.1.1629-17.51.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T09:02:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-55158"
}
]
}
suse-su-2025:03300-1
Vulnerability from csaf_suse
Published
2025-09-23 09:03
Modified
2025-09-23 09:03
Summary
Security update for vim
Notes
Title of the patch
Security update for vim
Description of the patch
This update for vim fixes the following issues:
Updated to 9.1.1629:
- CVE-2025-53905: Fixed malicious tar archive may causing a path traversal in Vim’s tar.vim plugin (bsc#1246604)
- CVE-2025-53906: Fixed malicious zip archive may causing a path traversal in Vim’s zip (bsc#1246602)
- CVE-2025-55157: Fixed use-after-free in internal tuple reference management (bsc#1247938)
- CVE-2025-55158: Fixed double-free in internal typed value (typval_T) management (bsc#1247939)
Patchnames
SUSE-2025-3300,SUSE-SLE-Micro-5.5-2025-3300,SUSE-SLE-Module-Basesystem-15-SP6-2025-3300,SUSE-SLE-Module-Basesystem-15-SP7-2025-3300,SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3300,SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3300,openSUSE-SLE-15.6-2025-3300
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for vim",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for vim fixes the following issues:\n\nUpdated to 9.1.1629:\n- CVE-2025-53905: Fixed malicious tar archive may causing a path traversal in Vim\u2019s tar.vim plugin (bsc#1246604)\n- CVE-2025-53906: Fixed malicious zip archive may causing a path traversal in Vim\u2019s zip (bsc#1246602)\n- CVE-2025-55157: Fixed use-after-free in internal tuple reference management (bsc#1247938)\n- CVE-2025-55158: Fixed double-free in internal typed value (typval_T) management (bsc#1247939)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3300,SUSE-SLE-Micro-5.5-2025-3300,SUSE-SLE-Module-Basesystem-15-SP6-2025-3300,SUSE-SLE-Module-Basesystem-15-SP7-2025-3300,SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3300,SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3300,openSUSE-SLE-15.6-2025-3300",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_03300-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:03300-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503300-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:03300-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-September/041803.html"
},
{
"category": "self",
"summary": "SUSE Bug 1246602",
"url": "https://bugzilla.suse.com/1246602"
},
{
"category": "self",
"summary": "SUSE Bug 1246604",
"url": "https://bugzilla.suse.com/1246604"
},
{
"category": "self",
"summary": "SUSE Bug 1247938",
"url": "https://bugzilla.suse.com/1247938"
},
{
"category": "self",
"summary": "SUSE Bug 1247939",
"url": "https://bugzilla.suse.com/1247939"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53905 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53905/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53906 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55158/"
}
],
"title": "Security update for vim",
"tracking": {
"current_release_date": "2025-09-23T09:03:45Z",
"generator": {
"date": "2025-09-23T09:03:45Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:03300-1",
"initial_release_date": "2025-09-23T09:03:45Z",
"revision_history": [
{
"date": "2025-09-23T09:03:45Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.1.1629-150500.20.33.1.aarch64",
"product": {
"name": "gvim-9.1.1629-150500.20.33.1.aarch64",
"product_id": "gvim-9.1.1629-150500.20.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "vim-9.1.1629-150500.20.33.1.aarch64",
"product": {
"name": "vim-9.1.1629-150500.20.33.1.aarch64",
"product_id": "vim-9.1.1629-150500.20.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "vim-small-9.1.1629-150500.20.33.1.aarch64",
"product": {
"name": "vim-small-9.1.1629-150500.20.33.1.aarch64",
"product_id": "vim-small-9.1.1629-150500.20.33.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.1.1629-150500.20.33.1.i586",
"product": {
"name": "gvim-9.1.1629-150500.20.33.1.i586",
"product_id": "gvim-9.1.1629-150500.20.33.1.i586"
}
},
{
"category": "product_version",
"name": "vim-9.1.1629-150500.20.33.1.i586",
"product": {
"name": "vim-9.1.1629-150500.20.33.1.i586",
"product_id": "vim-9.1.1629-150500.20.33.1.i586"
}
},
{
"category": "product_version",
"name": "vim-small-9.1.1629-150500.20.33.1.i586",
"product": {
"name": "vim-small-9.1.1629-150500.20.33.1.i586",
"product_id": "vim-small-9.1.1629-150500.20.33.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-data-9.1.1629-150500.20.33.1.noarch",
"product": {
"name": "vim-data-9.1.1629-150500.20.33.1.noarch",
"product_id": "vim-data-9.1.1629-150500.20.33.1.noarch"
}
},
{
"category": "product_version",
"name": "vim-data-common-9.1.1629-150500.20.33.1.noarch",
"product": {
"name": "vim-data-common-9.1.1629-150500.20.33.1.noarch",
"product_id": "vim-data-common-9.1.1629-150500.20.33.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.1.1629-150500.20.33.1.ppc64le",
"product": {
"name": "gvim-9.1.1629-150500.20.33.1.ppc64le",
"product_id": "gvim-9.1.1629-150500.20.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "vim-9.1.1629-150500.20.33.1.ppc64le",
"product": {
"name": "vim-9.1.1629-150500.20.33.1.ppc64le",
"product_id": "vim-9.1.1629-150500.20.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "vim-small-9.1.1629-150500.20.33.1.ppc64le",
"product": {
"name": "vim-small-9.1.1629-150500.20.33.1.ppc64le",
"product_id": "vim-small-9.1.1629-150500.20.33.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.1.1629-150500.20.33.1.s390x",
"product": {
"name": "gvim-9.1.1629-150500.20.33.1.s390x",
"product_id": "gvim-9.1.1629-150500.20.33.1.s390x"
}
},
{
"category": "product_version",
"name": "vim-9.1.1629-150500.20.33.1.s390x",
"product": {
"name": "vim-9.1.1629-150500.20.33.1.s390x",
"product_id": "vim-9.1.1629-150500.20.33.1.s390x"
}
},
{
"category": "product_version",
"name": "vim-small-9.1.1629-150500.20.33.1.s390x",
"product": {
"name": "vim-small-9.1.1629-150500.20.33.1.s390x",
"product_id": "vim-small-9.1.1629-150500.20.33.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.1.1629-150500.20.33.1.x86_64",
"product": {
"name": "gvim-9.1.1629-150500.20.33.1.x86_64",
"product_id": "gvim-9.1.1629-150500.20.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "vim-9.1.1629-150500.20.33.1.x86_64",
"product": {
"name": "vim-9.1.1629-150500.20.33.1.x86_64",
"product_id": "vim-9.1.1629-150500.20.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "vim-small-9.1.1629-150500.20.33.1.x86_64",
"product": {
"name": "vim-small-9.1.1629-150500.20.33.1.x86_64",
"product_id": "vim-small-9.1.1629-150500.20.33.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-desktop-applications:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-desktop-applications:15:sp7"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.1.1629-150500.20.33.1.noarch as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.1629-150500.20.33.1.noarch"
},
"product_reference": "vim-data-common-9.1.1629-150500.20.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150500.20.33.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.aarch64"
},
"product_reference": "vim-small-9.1.1629-150500.20.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150500.20.33.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.ppc64le"
},
"product_reference": "vim-small-9.1.1629-150500.20.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150500.20.33.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.s390x"
},
"product_reference": "vim-small-9.1.1629-150500.20.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150500.20.33.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.x86_64"
},
"product_reference": "vim-small-9.1.1629-150500.20.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.1.1629-150500.20.33.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.aarch64"
},
"product_reference": "vim-9.1.1629-150500.20.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.1.1629-150500.20.33.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.ppc64le"
},
"product_reference": "vim-9.1.1629-150500.20.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.1.1629-150500.20.33.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.s390x"
},
"product_reference": "vim-9.1.1629-150500.20.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.1.1629-150500.20.33.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.x86_64"
},
"product_reference": "vim-9.1.1629-150500.20.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-9.1.1629-150500.20.33.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.1629-150500.20.33.1.noarch"
},
"product_reference": "vim-data-9.1.1629-150500.20.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.1.1629-150500.20.33.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.1629-150500.20.33.1.noarch"
},
"product_reference": "vim-data-common-9.1.1629-150500.20.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150500.20.33.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.aarch64"
},
"product_reference": "vim-small-9.1.1629-150500.20.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150500.20.33.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.ppc64le"
},
"product_reference": "vim-small-9.1.1629-150500.20.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150500.20.33.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.s390x"
},
"product_reference": "vim-small-9.1.1629-150500.20.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150500.20.33.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.x86_64"
},
"product_reference": "vim-small-9.1.1629-150500.20.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.1.1629-150500.20.33.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.aarch64"
},
"product_reference": "vim-9.1.1629-150500.20.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.1.1629-150500.20.33.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.ppc64le"
},
"product_reference": "vim-9.1.1629-150500.20.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.1.1629-150500.20.33.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.s390x"
},
"product_reference": "vim-9.1.1629-150500.20.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.1.1629-150500.20.33.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.x86_64"
},
"product_reference": "vim-9.1.1629-150500.20.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-9.1.1629-150500.20.33.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-9.1.1629-150500.20.33.1.noarch"
},
"product_reference": "vim-data-9.1.1629-150500.20.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.1.1629-150500.20.33.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-common-9.1.1629-150500.20.33.1.noarch"
},
"product_reference": "vim-data-common-9.1.1629-150500.20.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150500.20.33.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.aarch64"
},
"product_reference": "vim-small-9.1.1629-150500.20.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150500.20.33.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.ppc64le"
},
"product_reference": "vim-small-9.1.1629-150500.20.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150500.20.33.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.s390x"
},
"product_reference": "vim-small-9.1.1629-150500.20.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150500.20.33.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.x86_64"
},
"product_reference": "vim-small-9.1.1629-150500.20.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.1.1629-150500.20.33.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.aarch64"
},
"product_reference": "gvim-9.1.1629-150500.20.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.1.1629-150500.20.33.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.ppc64le"
},
"product_reference": "gvim-9.1.1629-150500.20.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.1.1629-150500.20.33.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.s390x"
},
"product_reference": "gvim-9.1.1629-150500.20.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.1.1629-150500.20.33.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.x86_64"
},
"product_reference": "gvim-9.1.1629-150500.20.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.1.1629-150500.20.33.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.aarch64"
},
"product_reference": "gvim-9.1.1629-150500.20.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.1.1629-150500.20.33.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.ppc64le"
},
"product_reference": "gvim-9.1.1629-150500.20.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.1.1629-150500.20.33.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.s390x"
},
"product_reference": "gvim-9.1.1629-150500.20.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.1.1629-150500.20.33.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.x86_64"
},
"product_reference": "gvim-9.1.1629-150500.20.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.1.1629-150500.20.33.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.aarch64"
},
"product_reference": "gvim-9.1.1629-150500.20.33.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.1.1629-150500.20.33.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.ppc64le"
},
"product_reference": "gvim-9.1.1629-150500.20.33.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.1.1629-150500.20.33.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.s390x"
},
"product_reference": "gvim-9.1.1629-150500.20.33.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.1.1629-150500.20.33.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.x86_64"
},
"product_reference": "gvim-9.1.1629-150500.20.33.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.1.1629-150500.20.33.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.aarch64"
},
"product_reference": "vim-9.1.1629-150500.20.33.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.1.1629-150500.20.33.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.ppc64le"
},
"product_reference": "vim-9.1.1629-150500.20.33.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.1.1629-150500.20.33.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.s390x"
},
"product_reference": "vim-9.1.1629-150500.20.33.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.1.1629-150500.20.33.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.x86_64"
},
"product_reference": "vim-9.1.1629-150500.20.33.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-9.1.1629-150500.20.33.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:vim-data-9.1.1629-150500.20.33.1.noarch"
},
"product_reference": "vim-data-9.1.1629-150500.20.33.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.1.1629-150500.20.33.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:vim-data-common-9.1.1629-150500.20.33.1.noarch"
},
"product_reference": "vim-data-common-9.1.1629-150500.20.33.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150500.20.33.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.aarch64"
},
"product_reference": "vim-small-9.1.1629-150500.20.33.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150500.20.33.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.ppc64le"
},
"product_reference": "vim-small-9.1.1629-150500.20.33.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150500.20.33.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.s390x"
},
"product_reference": "vim-small-9.1.1629-150500.20.33.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-150500.20.33.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.x86_64"
},
"product_reference": "vim-small-9.1.1629-150500.20.33.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53905"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim\u0027s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-data-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53905",
"url": "https://www.suse.com/security/cve/CVE-2025-53905"
},
{
"category": "external",
"summary": "SUSE Bug 1246604 for CVE-2025-53905",
"url": "https://bugzilla.suse.com/1246604"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-data-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-data-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T09:03:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-53905"
},
{
"cve": "CVE-2025-53906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53906"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim\u0027s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-data-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53906",
"url": "https://www.suse.com/security/cve/CVE-2025-53906"
},
{
"category": "external",
"summary": "SUSE Bug 1246602 for CVE-2025-53906",
"url": "https://bugzilla.suse.com/1246602"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-data-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-data-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T09:03:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-53906"
},
{
"cve": "CVE-2025-55157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55157"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim\u0027s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-data-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55157",
"url": "https://www.suse.com/security/cve/CVE-2025-55157"
},
{
"category": "external",
"summary": "SUSE Bug 1247938 for CVE-2025-55157",
"url": "https://bugzilla.suse.com/1247938"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-data-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-data-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T09:03:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-55157"
},
{
"cve": "CVE-2025-55158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55158"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1406, when processing nested tuples during Vim9 script import operations, an error during evaluation can trigger a double-free in Vim\u0027s internal typed value (typval_T) management. Specifically, the clear_tv() function may attempt to free memory that has already been deallocated, due to improper lifetime handling in the handle_import / ex_import code paths. The vulnerability can only be triggered if a user explicitly opens and executes a specially crafted Vim script. This issue has been patched in version 9.1.1406.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-data-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55158",
"url": "https://www.suse.com/security/cve/CVE-2025-55158"
},
{
"category": "external",
"summary": "SUSE Bug 1247939 for CVE-2025-55158",
"url": "https://bugzilla.suse.com/1247939"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-data-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Micro 5.5:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:vim-small-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP6:gvim-9.1.1629-150500.20.33.1.x86_64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.aarch64",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.ppc64le",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.s390x",
"SUSE Linux Enterprise Module for Desktop Applications 15 SP7:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:gvim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-9.1.1629-150500.20.33.1.x86_64",
"openSUSE Leap 15.6:vim-data-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-data-common-9.1.1629-150500.20.33.1.noarch",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.aarch64",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.ppc64le",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.s390x",
"openSUSE Leap 15.6:vim-small-9.1.1629-150500.20.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-23T09:03:45Z",
"details": "moderate"
}
],
"title": "CVE-2025-55158"
}
]
}
suse-su-2025:20857-1
Vulnerability from csaf_suse
Published
2025-10-14 13:18
Modified
2025-10-14 13:18
Summary
Security update for vim
Notes
Title of the patch
Security update for vim
Description of the patch
This update for vim fixes the following issues:
- CVE-2025-53906: malicious zip archive may cause a path traversal (bsc#1246602)
- CVE-2025-53905: malicious tar archive may cause a path traversal (bsc#1246604)
- CVE-2025-55157: use-after-free in internal tuple reference management (bsc#1247938)
- CVE-2025-55158: double-free in internal typed value (typval_T) management (bsc#1247939)
Patchnames
SUSE-SLE-Micro-6.1-299
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for vim",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for vim fixes the following issues:\n\n- CVE-2025-53906: malicious zip archive may cause a path traversal (bsc#1246602)\n- CVE-2025-53905: malicious tar archive may cause a path traversal (bsc#1246604)\n- CVE-2025-55157: use-after-free in internal tuple reference management (bsc#1247938)\n- CVE-2025-55158: double-free in internal typed value (typval_T) management (bsc#1247939)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-299",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20857-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20857-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520857-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20857-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-October/042321.html"
},
{
"category": "self",
"summary": "SUSE Bug 1246602",
"url": "https://bugzilla.suse.com/1246602"
},
{
"category": "self",
"summary": "SUSE Bug 1246604",
"url": "https://bugzilla.suse.com/1246604"
},
{
"category": "self",
"summary": "SUSE Bug 1247938",
"url": "https://bugzilla.suse.com/1247938"
},
{
"category": "self",
"summary": "SUSE Bug 1247939",
"url": "https://bugzilla.suse.com/1247939"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53905 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53905/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53906 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55158/"
}
],
"title": "Security update for vim",
"tracking": {
"current_release_date": "2025-10-14T13:18:43Z",
"generator": {
"date": "2025-10-14T13:18:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20857-1",
"initial_release_date": "2025-10-14T13:18:43Z",
"revision_history": [
{
"date": "2025-10-14T13:18:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "vim-small-9.1.1629-slfo.1.1_1.1.aarch64",
"product": {
"name": "vim-small-9.1.1629-slfo.1.1_1.1.aarch64",
"product_id": "vim-small-9.1.1629-slfo.1.1_1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-data-common-9.1.1629-slfo.1.1_1.1.noarch",
"product": {
"name": "vim-data-common-9.1.1629-slfo.1.1_1.1.noarch",
"product_id": "vim-data-common-9.1.1629-slfo.1.1_1.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-small-9.1.1629-slfo.1.1_1.1.ppc64le",
"product": {
"name": "vim-small-9.1.1629-slfo.1.1_1.1.ppc64le",
"product_id": "vim-small-9.1.1629-slfo.1.1_1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-small-9.1.1629-slfo.1.1_1.1.s390x",
"product": {
"name": "vim-small-9.1.1629-slfo.1.1_1.1.s390x",
"product_id": "vim-small-9.1.1629-slfo.1.1_1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-small-9.1.1629-slfo.1.1_1.1.x86_64",
"product": {
"name": "vim-small-9.1.1629-slfo.1.1_1.1.x86_64",
"product_id": "vim-small-9.1.1629-slfo.1.1_1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.1.1629-slfo.1.1_1.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:vim-data-common-9.1.1629-slfo.1.1_1.1.noarch"
},
"product_reference": "vim-data-common-9.1.1629-slfo.1.1_1.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-slfo.1.1_1.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.aarch64"
},
"product_reference": "vim-small-9.1.1629-slfo.1.1_1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-slfo.1.1_1.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.ppc64le"
},
"product_reference": "vim-small-9.1.1629-slfo.1.1_1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-slfo.1.1_1.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.s390x"
},
"product_reference": "vim-small-9.1.1629-slfo.1.1_1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-slfo.1.1_1.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.x86_64"
},
"product_reference": "vim-small-9.1.1629-slfo.1.1_1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53905"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim\u0027s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:vim-data-common-9.1.1629-slfo.1.1_1.1.noarch",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53905",
"url": "https://www.suse.com/security/cve/CVE-2025-53905"
},
{
"category": "external",
"summary": "SUSE Bug 1246604 for CVE-2025-53905",
"url": "https://bugzilla.suse.com/1246604"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:vim-data-common-9.1.1629-slfo.1.1_1.1.noarch",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:vim-data-common-9.1.1629-slfo.1.1_1.1.noarch",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-14T13:18:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-53905"
},
{
"cve": "CVE-2025-53906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53906"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim\u0027s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:vim-data-common-9.1.1629-slfo.1.1_1.1.noarch",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53906",
"url": "https://www.suse.com/security/cve/CVE-2025-53906"
},
{
"category": "external",
"summary": "SUSE Bug 1246602 for CVE-2025-53906",
"url": "https://bugzilla.suse.com/1246602"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:vim-data-common-9.1.1629-slfo.1.1_1.1.noarch",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:vim-data-common-9.1.1629-slfo.1.1_1.1.noarch",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-14T13:18:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-53906"
},
{
"cve": "CVE-2025-55157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55157"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim\u0027s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:vim-data-common-9.1.1629-slfo.1.1_1.1.noarch",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55157",
"url": "https://www.suse.com/security/cve/CVE-2025-55157"
},
{
"category": "external",
"summary": "SUSE Bug 1247938 for CVE-2025-55157",
"url": "https://bugzilla.suse.com/1247938"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:vim-data-common-9.1.1629-slfo.1.1_1.1.noarch",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:vim-data-common-9.1.1629-slfo.1.1_1.1.noarch",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-14T13:18:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-55157"
},
{
"cve": "CVE-2025-55158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55158"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1406, when processing nested tuples during Vim9 script import operations, an error during evaluation can trigger a double-free in Vim\u0027s internal typed value (typval_T) management. Specifically, the clear_tv() function may attempt to free memory that has already been deallocated, due to improper lifetime handling in the handle_import / ex_import code paths. The vulnerability can only be triggered if a user explicitly opens and executes a specially crafted Vim script. This issue has been patched in version 9.1.1406.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:vim-data-common-9.1.1629-slfo.1.1_1.1.noarch",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55158",
"url": "https://www.suse.com/security/cve/CVE-2025-55158"
},
{
"category": "external",
"summary": "SUSE Bug 1247939 for CVE-2025-55158",
"url": "https://bugzilla.suse.com/1247939"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:vim-data-common-9.1.1629-slfo.1.1_1.1.noarch",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:vim-data-common-9.1.1629-slfo.1.1_1.1.noarch",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:vim-small-9.1.1629-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-14T13:18:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-55158"
}
]
}
suse-su-2025:20696-1
Vulnerability from csaf_suse
Published
2025-09-11 10:30
Modified
2025-09-11 10:30
Summary
Security update for vim
Notes
Title of the patch
Security update for vim
Description of the patch
This update for vim fixes the following issues:
- CVE-2025-53906: Fixed malicious zip archive causing path traversal (bsc#1246602)
- CVE-2025-53905: Fixed malicious tar archive causing path traversal (bsc#1246604)
- CVE-2025-55157: Fixed use-after-free in internal tuple reference management (bsc#1247938)
- CVE-2025-55158: Fixed double-free in internal typed value (typval_T) management (bsc#1247939)
- Update to 9.1.1629:
9.1.1629: Vim9: Not able to use more than 10 type arguments in a generic function
9.1.1628: fuzzy.c has a few issues
9.1.1627: fuzzy matching can be improved
9.1.1626: cindent: does not handle compound literals
9.1.1625: Autocompletion slow with include- and tag-completion
9.1.1624: Cscope not enabled on MacOS
9.1.1623: Buffer menu does not handle unicode names correctly
9.1.1622: Patch v9.1.1432 causes performance regressions
9.1.1621: flicker in popup menu during cmdline autocompletion
9.1.1620: filetype: composer.lock and symfony.lock files not recognized
9.1.1619: Incorrect E535 error message
9.1.1618: completion: incorrect selected index returned from complete_info()
9.1.1617: Vim9: some error messages can be improved
9.1.1616: xxd: possible buffer overflow with bitwise output
9.1.1615: diff format erroneously detected
9.1.1614: Vim9: possible variable type change
9.1.1613: tests: test_search leaves a few swapfiles behind
9.1.1612: Ctrl-G/Ctrl-T do not ignore the end search delimiter
9.1.1611: possible undefined behaviour in mb_decompose()
9.1.1610: completion: hang or E684 when 'tagfunc' calls complete()
9.1.1609: complete: Heap-buffer overflow with complete function
9.1.1608: No command-line completion for :unsilent {command}
9.1.1607: :apple command detected as :append
9.1.1606: filetype: a few more files are not recognized
9.1.1605: cannot specify scope for chdir()
9.1.1604: completion: incsearch highlight might be lost
9.1.1603: completion: cannot use autoloaded funcs in 'complete' F{func}
9.1.1602: filetype: requirements-*.txt files are not recognized
9.1.1601: Patch v8.1.0425 was wrong
9.1.1600: using diff anchors with hidden buffers fails silently
9.1.1599: :bnext doesn't go to unlisted help buffers
9.1.1598: filetype: waybar config file is not recognized
9.1.1597: CI reports leaks in libgtk3 library
9.1.1596: tests: Test_search_wildmenu_iminsert() depends on help file
9.1.1595: Wayland: non-portable use of select()
9.1.1594: completion: search completion throws errors
9.1.1593: Confusing error when compiling incomplete try block
9.1.1592: Vim9: crash with classes and garbage collection
9.1.1591: VMS support can be improved
9.1.1590: cannot perform autocompletion
9.1.1589: Cannot disable cscope interface using configure
9.1.1588: Vim9: cannot split dict inside command block
9.1.1587: Wayland: timeout not updated before select()
9.1.1586: Vim9: can define an enum/interface in a function
9.1.1585: Wayland: gvim still needs GVIM_ENABLE_WAYLAND
9.1.1584: using ints as boolean type
9.1.1583: gvim window lost its icons
9.1.1582: style issue in vim9type.c and vim9generics.c
9.1.1581: possible memory leak in vim9generics.c
9.1.1580: possible memory leak in vim9type.c
9.1.1579: Coverity complains about unchecked return value
9.1.1578: configure: comment still mentions autoconf 2.71
9.1.1577: Vim9: no generic support yet
9.1.1576: cannot easily trigger wildcard expansion
9.1.1575: tabpanel not drawn correctly with wrapped lines
9.1.1574: Dead code in mbyte.c
9.1.1573: Memory leak when pressing Ctrl-D in cmdline mode
9.1.1572: expanding $var does not escape whitespace for 'path'
9.1.1571: CmdlineChanged triggered to often
9.1.1570: Copilot suggested some improvements in cmdexpand.c
9.1.1569: tests: Vim9 tests can be improved
9.1.1568: need a few more default highlight groups
9.1.1567: crash when using inline diff mode
9.1.1566: self-referenced enum may not get freed
9.1.1565: configure: does not consider tiny version for wayland
9.1.1564: crash when opening popup to closing buffer
9.1.1563: completion: ruler may disappear
9.1.1562: close button always visible in the 'tabline'
9.1.1561: configure: wayland test can be improved
9.1.1560: configure: uses $PKG_CONFIG before it is defined
9.1.1559: tests: Test_popup_complete_info_01() fails when run alone
9.1.1558: str2blob() treats NULL string and empty string differently
9.1.1557: not possible to anchor specific lines in difff mode
9.1.1556: string handling in cmdexpand.c can be improved
9.1.1555: completion: repeated insertion of leader
9.1.1554: crash when omni-completion opens command-line window
9.1.1553: Vim9: crash when accessing a variable in if condition
9.1.1552: [security]: path traversal issue in tar.vim
9.1.1551: [security]: path traversal issue in zip.vim
9.1.1550: defaults: 'showcmd' is not enabled in non-compatible mode on Unix
9.1.1549: filetype: pkl files are not recognized
9.1.1548: filetype: OpenFGA files are not recognized
9.1.1547: Wayland: missing ifdef
9.1.1546: Vim9: error with has() and short circuit evaluation
9.1.1545: typo in os_unix.c
9.1.1544: :retab cannot be limited to indentation only
9.1.1543: Wayland: clipboard appears to not be working
9.1.1542: Coverity complains about uninitialized variable
9.1.1541: Vim9: error when last enum value ends with a comma
9.1.1540: completion: menu state wrong on interruption
9.1.1539: completion: messages don't respect 'shm' setting
9.1.1537: helptoc: still some issues when markdown code blocks
9.1.1536: tests: test_plugin_comment uses wrong :Check command
9.1.1535: the maximum search count uses hard-coded value 99
9.1.1534: unnecessary code in tabpanel.c
9.1.1533: helptoc: does not handle code sections in markdown well
9.1.1532: termdebug: not enough ways to configure breakpoints
9.1.1531: confusing error with nested legacy function
9.1.1530: Missing version change in v9.1.1529
9.1.1529: Win32: the toolbar in the GUI is old and dated
9.1.1528: completion: crash with getcompletion()
9.1.1527: Vim9: Crash with string compound assignment
9.1.1526: completion: search completion match may differ in case
9.1.1525: tests: testdir/ is a bit messy
9.1.1524: tests: too many imports in the test suite
9.1.1523: tests: test_clipmethod fails in non X11 environment
9.1.1522: tests: still some ANSI escape sequences in test output
9.1.1521: completion: pum does not reset scroll pos on reopen with 'noselect'
9.1.1520: completion: search completion doesn't handle 'smartcase' well
9.1.1519: tests: Test_termdebug_decimal_breakpoints() may fail
9.1.1518: getcompletiontype() may crash
9.1.1517: filetype: autopkgtest files are not recognized
9.1.1516: tests: no test that 'incsearch' is updated after search completion
9.1.1515: Coverity complains about potential unterminated strings
9.1.1514: Coverity complains about the use of tmpfile()
9.1.1513: resizing Vim window causes unexpected internal window width
9.1.1512: completion: can only complete from keyword characters
9.1.1511: tests: two edit tests change v:testing from 1 to 0
9.1.1510: Search completion may use invalid memory
9.1.1509: patch 9.1.1505 was not good
9.1.1508: string manipulation can be improved in cmdexpand.c
9.1.1507: symlinks are resolved on :cd commands
9.1.1506: tests: missing cleanup in Test_search_cmdline_incsearch_highlight()
9.1.1505: not possible to return completion type for :ex command
9.1.1504: filetype: numbat files are not recognized
9.1.1503: filetype: haxe files are not recognized
9.1.1502: filetype: quickbms files are not recognized
9.1.1501: filetype: flix files are not recognized
9.1.1500: if_python: typo in python error variable
9.1.1499: MS-Windows: no indication of ARM64 architecture
9.1.1498: completion: 'complete' funcs behave different to 'omnifunc'
9.1.1497: Link error with shm_open()
9.1.1496: terminal: still not highlighting empty cells correctly
9.1.1495: Wayland: uses $XDG_SEAT to determine seat
9.1.1494: runtime(tutor): no French translation for Chapter 2
9.1.1493: manually comparing positions on buffer
9.1.1492: tests: failure when Wayland compositor fails to start
9.1.1491: missing out-of-memory checks in cmdexpand.c
9.1.1490: 'wildchar' does not work in search contexts
9.1.1489: terminal: no visual highlight of empty cols with empty 'listchars'
9.1.1488: configure: using obsolete macro AC_PROG_GCC_TRADITIONAL
9.1.1487: :cl doesn't invoke :clist
9.1.1486: documentation issues with Wayland
9.1.1485: missing Wayland clipboard support
9.1.1484: tests: Turkish locale tests fails on Mac
9.1.1483: not possible to translation position in buffer
9.1.1482: scrolling with 'splitkeep' and line()
9.1.1481: gcc complains about uninitialized variable
9.1.1480: Turkish translation outdated
9.1.1479: regression when displaying localized percentage position
9.1.1478: Unused assignment in ex_uniq()
9.1.1476: no easy way to deduplicate text
9.1.1476: missing out-of-memory checks in cmdexpand.c
9.1.1475: completion: regression when "nearest" in 'completeopt'
9.1.1474: missing out-of-memory check in mark.c
9.1.1473: inconsistent range arg for :diffget/diffput
9.1.1472: if_python: PySequence_Fast_{GET_SIZE,GET_ITEM} removed
9.1.1471: completion: inconsistent ordering with CTRL-P
9.1.1470: use-after-free with popup callback on error
9.1.1469: potential buffer-underflow with invalid hl_id
9.1.1468: filetype: bright(er)script files are not recognized
9.1.1467: too many strlen() calls
9.1.1466: filetype: not all lex files are recognized
9.1.1465: tabpanel: not correctly drawn with 'equalalways'
9.1.1464: gv does not work in operator-pending mode
9.1.1463: Integer overflow in getmarklist() after linewise operation
9.1.1462: missing change from patch v9.1.1461
9.1.1461: tabpanel: tabpanel vanishes with popup menu
9.1.1460: MS-Windows: too many strlen() calls in os_win32.c
9.1.1459: xxd: coloring output is inefficient
9.1.1458: tabpanel: tabs not properly updated with 'stpl'
9.1.1457: compile warning with tabpanelopt
9.1.1456: comment plugin fails toggling if 'cms' contains \
9.1.1455: Haiku: dailog objects created with no reference
9.1.1454: tests: no test for pum at line break position
9.1.1453: tests: Test_geometry() may fail
9.1.1452: completion: redundant check for completion flags
9.1.1451: tabpanel rendering artifacts when scrolling
9.1.1450: Session has wrong arglist with :tcd and :arglocal
9.1.1449: typo in pum_display()
9.1.1448: tabpanel is not displayed correctly when msg_scrolled
9.1.1447: completion: crash when backspacing with fuzzy completion
9.1.1446: filetype: cuda-gdb config files are not recognized
9.1.1445: negative matchfuzzy scores although there is a match
9.1.1444: Unused assignment in set_fuzzy_score()
9.1.1443: potential buffer underflow in insertchar()
9.1.1442: tests: Test_diff_fold_redraw() is insufficient
9.1.1441: completion: code can be improved
9.1.1440: too many strlen() calls in os_win32.c
9.1.1439: Last diff folds not merged
9.1.1438: tests: Test_breakindent_list_split() fails
9.1.1437: MS-Windows: internal compile error in uc_list()
9.1.1436: GUI control code is displayed on the console on startup
9.1.1435: completion: various flaws in fuzzy completion
9.1.1434: MS-Windows: missing out-of-memory checks in os_win32.c
9.1.1433: Unnecessary :if when writing session
9.1.1432: GTK GUI: Buffer menu does not handle unicode correctly
9.1.1431: Hit-Enter Prompt when loading session files
9.1.1430: tabpanel may flicker in the GUI
9.1.1429: dragging outside the tabpanel changes tabpagenr
9.1.1428: completion: register completion needs cleanup
9.1.1427: rendering artifacts with the tabpanel
9.1.1426: completion: register contents not completed
9.1.1425: tabpanel: there are still some problems with the tabpanel
9.1.1424: PMenu selection broken with multi-line selection and limits
9.1.1423: :tag command not working correctly using Vim9 Script
9.1.1422: scheduling of complete function can be improved
9.1.1421: tests: need a test for the new-style tutor.tutor
9.1.1420: tests: could need some more tests for shebang lines
9.1.1419: It is difficult to ignore all but some events
9.1.1418: configures GUI auto detection favors GTK2
9.1.1417: missing info about register completion in complete_info()
9.1.1416: completion limits not respected for fuzzy completions
9.1.1415: potential use-after free when there is an error in 'tabpanel'
9.1.1414: MS-Windows: compile warnings in os_win32.c
9.1.1413: spurious CursorHold triggered in GUI on startup
9.1.1412: tests: Test_tabpanel_tabonly() fails on larger screens
9.1.1411: crash when calling non-existing function for tabpanel
9.1.1410: out-of-bounds access with 'completefunc'
9.1.1409: using f-flag in 'complete' conflicts with Neovim
9.1.1408: not easily possible to complete from register content
9.1.1407: Can't use getpos('v') in OptionSet when using setbufvar()
9.1.1406: crash when importing invalid tuple
9.1.1405: tests: no test for mapping with special keys in session file
9.1.1404: wrong link to Chapter 2 in new-tutor
9.1.1403: expansion of 'tabpanelopt' value adds wrong values
9.1.1402: multi-byte mappings not properly stored in session file
9.1.1401: list not materialized in prop_list()
9.1.1400: [security]: use-after-free when evaluating tuple fails
9.1.1399: tests: test_codestyle fails for auto-generated files
9.1.1398: completion: trunc does not follow Pmenu highlighting attributes
9.1.1397: tabpanel not correctly updated on :tabonly
9.1.1396: 'errorformat' is a global option
9.1.1395: search_stat not reset when pattern differs in case
9.1.1394: tabpanel not correctly redrawn on tabonly
9.1.1393: missing test for switching buffers and reusing curbuf
9.1.1392: missing patch number
9.1.1391: Vim does not have a vertical tabpanel
9.1.1390: style: more wrong indentation
9.1.1389: completion: still some issue when 'isexpand' contains a space
9.1.1388: Scrolling one line too far with 'nosmoothscroll' page scrolling
9.1.1387: memory leak when buflist_new() fails to reuse curbuf
9.1.1386: MS-Windows: some minor problems building on AARCH64
9.1.1385: inefficient loop for 'nosmoothscroll' scrolling
9.1.1384: still some problem with the new tutors filetype plugin
9.1.1383: completion: 'isexpand' option does not handle space char correct
9.1.1382: if_ruby: unused compiler warnings from ruby internals
9.1.1381: completion: cannot return to original text
9.1.1380: 'eventignorewin' only checked for current buffer
9.1.1379: MS-Windows: error when running evim when space in path
9.1.1378: sign without text overwrites number option
9.1.1377: patch v9.1.1370 causes some GTK warning messages
9.1.1376: quickfix dummy buffer may remain as dummy buffer
9.1.1375: [security]: possible heap UAF with quickfix dummy buffer
9.1.1374: completion: 'smartcase' not respected when filtering matches
9.1.1373: 'completeopt' checking logic can be simplified
9.1.1372: style: braces issues in various files
9.1.1371: style: indentation and brace issues in insexpand.c
9.1.1370: CI Tests favor GTK2 over GTK3
9.1.1369: configure still using autoconf 2.71
9.1.1368: GTK3 and GTK4 will drop numeric cursor support.
9.1.1367: too many strlen() calls in gui.c
9.1.1366: v9.1.1364 unintentionally changed sign.c and sound.c
9.1.1365: MS-Windows: compile warnings and too many strlen() calls
9.1.1364: style: more indentation issues
9.1.1363: style: inconsistent indentation in various files
9.1.1362: Vim9: type ignored when adding tuple to instance list var
9.1.1361: [security]: possible use-after-free when closing a buffer
9.1.1360: filetype: GNU Radio companion files are not recognized
9.1.1359: filetype: GNU Radio config files are not recognized
9.1.1358: if_lua: compile warnings with gcc15
9.1.1357: Vim incorrectly escapes tags with "[" in a help buffer
9.1.1356: Vim9: crash when unletting variable
9.1.1355: The pum_redraw() function is too complex
9.1.1354: tests: Test_terminalwinscroll_topline() fails on Windows
9.1.1353: missing change from v9.1.1350
9.1.1352: style: inconsistent indent in insexpand.c
9.1.1351: Return value of getcmdline() inconsistent in CmdlineLeavePre
9.1.1350: tests: typo in Test_CmdlineLeavePre_cabbr()
9.1.1349: CmdlineLeavePre may trigger twice
9.1.1348: still E315 with the terminal feature
9.1.1347: small problems with gui_w32.c
9.1.1346: missing out-of-memory check in textformat.c
9.1.1345: tests: Test_xxd_color2() test failure dump diff is misleading
9.1.1344: double free in f_complete_match() (after v9.1.1341)
9.1.1343: filetype: IPython files are not recognized
9.1.1342: Shebang filetype detection can be improved
9.1.1341: cannot define completion triggers
9.1.1340: cannot complete :filetype arguments
9.1.1339: missing out-of-memory checks for enc_to_utf16()/utf16_to_enc()
9.1.1338: Calling expand() interferes with cmdcomplete_info()
9.1.1337: Undo corrupted with 'completeopt' "preinsert" when switching buffer
9.1.1336: comment plugin does not support case-insensitive 'commentstring'
9.1.1335: Coverity complains about Null pointer dereferences
9.1.1334: Coverity complains about unchecked return value
9.1.1333: Coverity: complains about unutilized variable
9.1.1332: Vim9: segfault when using super within a lambda
9.1.1331: Leaking memory with cmdcomplete()
9.1.1330: may receive E315 in terminal
9.1.1329: cannot get information about command line completion
9.1.1328: too many strlen() calls in indent.c
9.1.1327: filetype: nroff detection can be improved
9.1.1326: invalid cursor position after 'tagfunc'
9.1.1325: tests: not checking error numbers properly
9.1.1324: undefined behaviour if X11 connection dies
9.1.1323: b:undo_ftplugin not executed when re-using buffer
9.1.1322: small delete register cannot paste multi-line correctly
9.1.1321: filetype: MS ixx and mpp files are not recognized
9.1.1320: filetype: alsoft config files are not recognized
9.1.1319: Various typos in the code, issue with test_inst_complete.vim
9.1.1318: tests: test_format fails
9.1.1317: noisy error when restoring folds from session fails
9.1.1316: missing memory allocation failure in os_mswin.c
9.1.1315: completion: issue with fuzzy completion and 'completefuzzycollect'
9.1.1314: max allowed string width too small
9.1.1313: compile warning about uninitialized value
9.1.1312: tests: Test_backupskip() fails when HOME is defined
9.1.1311: completion: not possible to limit number of matches
9.1.1310: completion: redundant check for preinsert effect
9.1.1309: tests: no test for 'pummaxwidth' with non-truncated "kind"
9.1.1308: completion: cannot order matches by distance to cursor
9.1.1307: make syntax does not reliably detect different flavors
9.1.1306: completion menu rendering can be improved
9.1.1305: completion menu active after switching windows/tabs
9.1.1304: filetype: some man files are not recognized
9.1.1303: missing out-of-memory check in linematch.c
9.1.1302: Coverity warns about using uninitialized value
9.1.1301: completion: cannot configure completion functions with 'complete'
9.1.1300: wrong detection of -inf
9.1.1299: filetype: mbsyncrc files are not recognized
9.1.1298: define_function() is too long
9.1.1297: Ctrl-D scrolling can get stuck
9.1.1296: completion: incorrect truncation logic
9.1.1295: clientserver: does not handle :stopinsert correctly
9.1.1294: gui tabline menu does not use confirm when closing tabs
9.1.1293: comment plugin does not handle 'exclusive' selection for comment object
9.1.1292: statusline not correctly evaluated
9.1.1291: too many strlen() calls in buffer.c
9.1.1290: tests: missing cleanup in test_filetype.vim
9.1.1289: tests: no test for matchparen plugin with WinScrolled event
9.1.1288: Using wrong window in ll_resize_stack()
9.1.1287: quickfix code can be further improved
9.1.1286: filetype: help files not detected when 'iskeyword' includes ":"
9.1.1285: Vim9: no error message for missing method after "super."
9.1.1284: not possible to configure pum truncation char
9.1.1283: quickfix stack is limited to 10 items
9.1.1282: Build and test failure without job feature
9.1.1281: extra newline output when editing stdin
9.1.1280: trailing additional semicolon in get_matches_in_str()
9.1.1279: Vim9: null_object and null_class are no reserved names
9.1.1278: Vim9: too long functions in vim9type.c
9.1.1277: tests: trailing comment char in test_popupwin
9.1.1276: inline word diff treats multibyte chars as word char
9.1.1275: MS-Windows: Not possible to pass additional flags to Make_mvc
9.1.1274: Vim9: no support for object<type> as variable type
9.1.1273: Coverity warns about using uninitialized value
9.1.1272: completion: in keyword completion Ctrl_P cannot go back after Ctrl_N
9.1.1271: filetype: Power Query files are not recognized
9.1.1270: missing out-of-memory checks in buffer.c
9.1.1269: completion: compl_shown_match is updated when starting keyword completion
9.1.1268: filetype: dax files are not recognized
9.1.1267: Vim9: no support for type list/dict<object<any>>
9.1.1266: MS-Windows: type conversion warnings
9.1.1265: tests: no tests for typing normal char during completion
9.1.1264: Vim9: error when comparing objects
9.1.1263: string length wrong in get_last_inserted_save()
9.1.1262: heap-buffer-overflow with narrow 'pummaxwidth' value
9.1.1261: No test for 'pummaxwidth' non-truncated items
9.1.1260: Hang when filtering buffer with NUL bytes
9.1.1259: some issues with comment package and tailing spaces
9.1.1258: regexp: max \U and \%U value is limited by INT_MAX
9.1.1257: Mixing vim_strsize() with mb_ptr2cells() in pum_redraw()
9.1.1256: if_python: duplicate tuple data entries
9.1.1255: missing test condition for 'pummaxwidth' setting
9.1.1254: need more tests for the comment plugin
9.1.1253: abort when closing window with attached quickfix data
9.1.1252: typos in code and docs related to 'diffopt' "inline:"
9.1.1251: if_python: build error with tuples and dynamic python
9.1.1250: cannot set the maximum popup menu width
9.1.1249: tests: no test that 'listchars' "eol" doesn't affect "gM"
9.1.1248: compile error when building without FEAT_QUICKFIX
9.1.1247: fragile setup to get (preferred) keys from key_name_entry
9.1.1246: coverity complains about some changes in v9.1.1243
9.1.1245: need some more tests for curly braces evaluation
9.1.1244: part of patch v9.1.1242 was wrong
9.1.1243: diff mode is lacking for changes within lines
9.1.1242: Crash when evaluating variable name
9.1.1241: wrong preprocessort indentation in term.c
9.1.1240: Regression with ic/ac text objects and comment plugin
9.1.1239: if_python: no tuple data type support
9.1.1238: wrong cursor column with 'set splitkeep=screen'
9.1.1237: Compile error with C89 compiler in term.c
9.1.1236: tests: test_comments leaves swapfiles around
9.1.1235: cproto files are outdated
9.1.1234: Compile error when SIZE_MAX is not defined
9.1.1233: Coverity warns about NULL pointer when triggering WinResized
9.1.1232: Vim script is missing the tuple data type
9.1.1231: filetype: SPA JSON files are not recognized
9.1.1230: inconsistent CTRL-C behaviour for popup windows
9.1.1229: the comment plugin can be improved
9.1.1228: completion: current position column wrong after got a match
9.1.1227: no tests for the comment package
9.1.1226: "shellcmdline" completion doesn't work with input()
9.1.1225: extra NULL check in VIM_CLEAR()
9.1.1224: cannot :put while keeping indent
9.1.1223: wrong translation used for encoding failures
9.1.1222: using wrong length for last inserted string
9.1.1221: Wrong cursor pos when leaving Insert mode just after 'autoindent'
9.1.1220: filetype: uv.lock file not recognized
9.1.1219: Strange error with wrong type for matchfuzzy() "camelcase"
9.1.1218: missing out-of-memory check in filepath.c
9.1.1217: tests: typos in test_matchfuzzy.vim
9.1.1216: Pasting the '.' register multiple times may not work
9.1.1215: Patch 9.1.1213 has some issues
9.1.1214: matchfuzzy() can be improved for camel case matches
9.1.1213: cannot :put while keeping indent
9.1.1212: too many strlen() calls in edit.c
9.1.1212: filetype: logrotate'd pacmanlogs are not recognized
9.1.1211: TabClosedPre is triggered just before the tab is being freed
9.1.1210: translation(ru): missing Russian translation for the new tutor
9.1.1209: colorcolumn not drawn after virtual text lines
9.1.1208: MS-Windows: not correctly restoring alternate screen on Win 10
9.1.1207: MS-Windows: build warning in filepath.c
9.1.1206: tests: test_filetype fails when a file is a directory
9.1.1205: completion: preinserted text not removed when closing pum
9.1.1204: MS-Windows: crash when passing long string to expand()
9.1.1203: matchparen keeps cursor on case label in sh filetype
9.1.1202: Missing TabClosedPre autocommand
9.1.1201: 'completefuzzycollect' does not handle dictionary correctly
9.1.1200: cmdline pum not cleared for input() completion
9.1.1199: gvim uses hardcoded xpm icon file
9.1.1198: [security]: potential data loss with zip.vim
9.1.1197: process_next_cpt_value() uses wrong condition
9.1.1196: filetype: config files for container tools are not recognized
9.1.1195: inside try-block: fn body executed with default arg undefined
9.1.1194: filetype: false positive help filetype detection
9.1.1193: Unnecessary use of STRCAT() in au_event_disable()
9.1.1192: Vim crashes with term response debug logging enabled
9.1.1191: tests: test for patch 9.1.1186 doesn't fail without the patch
9.1.1190: C indentation does not detect multibyte labels
9.1.1189: if_python: build error due to incompatible pointer types
9.1.1188: runtime(tera): tera support can be improved
9.1.1187: matchparen plugin wrong highlights shell case statement
9.1.1186: filetype: help files in git repos are not detected
9.1.1185: endless loop with completefuzzycollect and no match found
9.1.1184: Unnecessary use of vim_tolower() in vim_strnicmp_asc()
9.1.1083: "above" virtual text breaks cursorlineopt=number
9.1.1182: No cmdline completion for 'completefuzzycollect'
9.1.1181: Unnecessary STRLEN() calls in insexpand.c
9.1.1180: short-description
9.1.1179: too many strlen() calls in misc2.c
9.1.1178: not possible to generate completion candidates using fuzzy matching
9.1.1177: filetype: tera files not detected
Patchnames
SUSE-SLE-Micro-6.0-457
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for vim",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for vim fixes the following issues:\n\n- CVE-2025-53906: Fixed malicious zip archive causing path traversal (bsc#1246602)\n- CVE-2025-53905: Fixed malicious tar archive causing path traversal (bsc#1246604)\n- CVE-2025-55157: Fixed use-after-free in internal tuple reference management (bsc#1247938)\n- CVE-2025-55158: Fixed double-free in internal typed value (typval_T) management (bsc#1247939)\n \n- Update to 9.1.1629:\n 9.1.1629: Vim9: Not able to use more than 10 type arguments in a generic function\n 9.1.1628: fuzzy.c has a few issues\n 9.1.1627: fuzzy matching can be improved\n 9.1.1626: cindent: does not handle compound literals\n 9.1.1625: Autocompletion slow with include- and tag-completion\n 9.1.1624: Cscope not enabled on MacOS\n 9.1.1623: Buffer menu does not handle unicode names correctly\n 9.1.1622: Patch v9.1.1432 causes performance regressions\n 9.1.1621: flicker in popup menu during cmdline autocompletion\n 9.1.1620: filetype: composer.lock and symfony.lock files not recognized\n 9.1.1619: Incorrect E535 error message\n 9.1.1618: completion: incorrect selected index returned from complete_info()\n 9.1.1617: Vim9: some error messages can be improved\n 9.1.1616: xxd: possible buffer overflow with bitwise output\n 9.1.1615: diff format erroneously detected\n 9.1.1614: Vim9: possible variable type change\n 9.1.1613: tests: test_search leaves a few swapfiles behind\n 9.1.1612: Ctrl-G/Ctrl-T do not ignore the end search delimiter\n 9.1.1611: possible undefined behaviour in mb_decompose()\n 9.1.1610: completion: hang or E684 when \u0027tagfunc\u0027 calls complete()\n 9.1.1609: complete: Heap-buffer overflow with complete function\n 9.1.1608: No command-line completion for :unsilent {command}\n 9.1.1607: :apple command detected as :append\n 9.1.1606: filetype: a few more files are not recognized\n 9.1.1605: cannot specify scope for chdir()\n 9.1.1604: completion: incsearch highlight might be lost\n 9.1.1603: completion: cannot use autoloaded funcs in \u0027complete\u0027 F{func}\n 9.1.1602: filetype: requirements-*.txt files are not recognized\n 9.1.1601: Patch v8.1.0425 was wrong\n 9.1.1600: using diff anchors with hidden buffers fails silently\n 9.1.1599: :bnext doesn\u0027t go to unlisted help buffers\n 9.1.1598: filetype: waybar config file is not recognized\n 9.1.1597: CI reports leaks in libgtk3 library\n 9.1.1596: tests: Test_search_wildmenu_iminsert() depends on help file\n 9.1.1595: Wayland: non-portable use of select()\n 9.1.1594: completion: search completion throws errors\n 9.1.1593: Confusing error when compiling incomplete try block\n 9.1.1592: Vim9: crash with classes and garbage collection\n 9.1.1591: VMS support can be improved\n 9.1.1590: cannot perform autocompletion\n 9.1.1589: Cannot disable cscope interface using configure\n 9.1.1588: Vim9: cannot split dict inside command block\n 9.1.1587: Wayland: timeout not updated before select()\n 9.1.1586: Vim9: can define an enum/interface in a function\n 9.1.1585: Wayland: gvim still needs GVIM_ENABLE_WAYLAND\n 9.1.1584: using ints as boolean type\n 9.1.1583: gvim window lost its icons\n 9.1.1582: style issue in vim9type.c and vim9generics.c\n 9.1.1581: possible memory leak in vim9generics.c\n 9.1.1580: possible memory leak in vim9type.c\n 9.1.1579: Coverity complains about unchecked return value\n 9.1.1578: configure: comment still mentions autoconf 2.71\n 9.1.1577: Vim9: no generic support yet\n 9.1.1576: cannot easily trigger wildcard expansion\n 9.1.1575: tabpanel not drawn correctly with wrapped lines\n 9.1.1574: Dead code in mbyte.c\n 9.1.1573: Memory leak when pressing Ctrl-D in cmdline mode\n 9.1.1572: expanding $var does not escape whitespace for \u0027path\u0027\n 9.1.1571: CmdlineChanged triggered to often\n 9.1.1570: Copilot suggested some improvements in cmdexpand.c\n 9.1.1569: tests: Vim9 tests can be improved\n 9.1.1568: need a few more default highlight groups\n 9.1.1567: crash when using inline diff mode\n 9.1.1566: self-referenced enum may not get freed\n 9.1.1565: configure: does not consider tiny version for wayland\n 9.1.1564: crash when opening popup to closing buffer\n 9.1.1563: completion: ruler may disappear\n 9.1.1562: close button always visible in the \u0027tabline\u0027\n 9.1.1561: configure: wayland test can be improved\n 9.1.1560: configure: uses $PKG_CONFIG before it is defined\n 9.1.1559: tests: Test_popup_complete_info_01() fails when run alone\n 9.1.1558: str2blob() treats NULL string and empty string differently\n 9.1.1557: not possible to anchor specific lines in difff mode\n 9.1.1556: string handling in cmdexpand.c can be improved\n 9.1.1555: completion: repeated insertion of leader\n 9.1.1554: crash when omni-completion opens command-line window\n 9.1.1553: Vim9: crash when accessing a variable in if condition\n 9.1.1552: [security]: path traversal issue in tar.vim\n 9.1.1551: [security]: path traversal issue in zip.vim\n 9.1.1550: defaults: \u0027showcmd\u0027 is not enabled in non-compatible mode on Unix\n 9.1.1549: filetype: pkl files are not recognized\n 9.1.1548: filetype: OpenFGA files are not recognized\n 9.1.1547: Wayland: missing ifdef\n 9.1.1546: Vim9: error with has() and short circuit evaluation\n 9.1.1545: typo in os_unix.c\n 9.1.1544: :retab cannot be limited to indentation only\n 9.1.1543: Wayland: clipboard appears to not be working\n 9.1.1542: Coverity complains about uninitialized variable\n 9.1.1541: Vim9: error when last enum value ends with a comma\n 9.1.1540: completion: menu state wrong on interruption\n 9.1.1539: completion: messages don\u0027t respect \u0027shm\u0027 setting\n 9.1.1537: helptoc: still some issues when markdown code blocks\n 9.1.1536: tests: test_plugin_comment uses wrong :Check command\n 9.1.1535: the maximum search count uses hard-coded value 99\n 9.1.1534: unnecessary code in tabpanel.c\n 9.1.1533: helptoc: does not handle code sections in markdown well\n 9.1.1532: termdebug: not enough ways to configure breakpoints\n 9.1.1531: confusing error with nested legacy function\n 9.1.1530: Missing version change in v9.1.1529\n 9.1.1529: Win32: the toolbar in the GUI is old and dated\n 9.1.1528: completion: crash with getcompletion()\n 9.1.1527: Vim9: Crash with string compound assignment\n 9.1.1526: completion: search completion match may differ in case\n 9.1.1525: tests: testdir/ is a bit messy\n 9.1.1524: tests: too many imports in the test suite\n 9.1.1523: tests: test_clipmethod fails in non X11 environment\n 9.1.1522: tests: still some ANSI escape sequences in test output\n 9.1.1521: completion: pum does not reset scroll pos on reopen with \u0027noselect\u0027\n 9.1.1520: completion: search completion doesn\u0027t handle \u0027smartcase\u0027 well\n 9.1.1519: tests: Test_termdebug_decimal_breakpoints() may fail\n 9.1.1518: getcompletiontype() may crash\n 9.1.1517: filetype: autopkgtest files are not recognized\n 9.1.1516: tests: no test that \u0027incsearch\u0027 is updated after search completion\n 9.1.1515: Coverity complains about potential unterminated strings\n 9.1.1514: Coverity complains about the use of tmpfile()\n 9.1.1513: resizing Vim window causes unexpected internal window width\n 9.1.1512: completion: can only complete from keyword characters\n 9.1.1511: tests: two edit tests change v:testing from 1 to 0\n 9.1.1510: Search completion may use invalid memory\n 9.1.1509: patch 9.1.1505 was not good\n 9.1.1508: string manipulation can be improved in cmdexpand.c\n 9.1.1507: symlinks are resolved on :cd commands\n 9.1.1506: tests: missing cleanup in Test_search_cmdline_incsearch_highlight()\n 9.1.1505: not possible to return completion type for :ex command\n 9.1.1504: filetype: numbat files are not recognized\n 9.1.1503: filetype: haxe files are not recognized\n 9.1.1502: filetype: quickbms files are not recognized\n 9.1.1501: filetype: flix files are not recognized\n 9.1.1500: if_python: typo in python error variable\n 9.1.1499: MS-Windows: no indication of ARM64 architecture\n 9.1.1498: completion: \u0027complete\u0027 funcs behave different to \u0027omnifunc\u0027\n 9.1.1497: Link error with shm_open()\n 9.1.1496: terminal: still not highlighting empty cells correctly\n 9.1.1495: Wayland: uses $XDG_SEAT to determine seat\n 9.1.1494: runtime(tutor): no French translation for Chapter 2\n 9.1.1493: manually comparing positions on buffer\n 9.1.1492: tests: failure when Wayland compositor fails to start\n 9.1.1491: missing out-of-memory checks in cmdexpand.c\n 9.1.1490: \u0027wildchar\u0027 does not work in search contexts\n 9.1.1489: terminal: no visual highlight of empty cols with empty \u0027listchars\u0027\n 9.1.1488: configure: using obsolete macro AC_PROG_GCC_TRADITIONAL\n 9.1.1487: :cl doesn\u0027t invoke :clist\n 9.1.1486: documentation issues with Wayland\n 9.1.1485: missing Wayland clipboard support\n 9.1.1484: tests: Turkish locale tests fails on Mac\n 9.1.1483: not possible to translation position in buffer\n 9.1.1482: scrolling with \u0027splitkeep\u0027 and line()\n 9.1.1481: gcc complains about uninitialized variable\n 9.1.1480: Turkish translation outdated\n 9.1.1479: regression when displaying localized percentage position\n 9.1.1478: Unused assignment in ex_uniq()\n 9.1.1476: no easy way to deduplicate text\n 9.1.1476: missing out-of-memory checks in cmdexpand.c\n 9.1.1475: completion: regression when \"nearest\" in \u0027completeopt\u0027\n 9.1.1474: missing out-of-memory check in mark.c\n 9.1.1473: inconsistent range arg for :diffget/diffput\n 9.1.1472: if_python: PySequence_Fast_{GET_SIZE,GET_ITEM} removed\n 9.1.1471: completion: inconsistent ordering with CTRL-P\n 9.1.1470: use-after-free with popup callback on error\n 9.1.1469: potential buffer-underflow with invalid hl_id\n 9.1.1468: filetype: bright(er)script files are not recognized\n 9.1.1467: too many strlen() calls\n 9.1.1466: filetype: not all lex files are recognized\n 9.1.1465: tabpanel: not correctly drawn with \u0027equalalways\u0027\n 9.1.1464: gv does not work in operator-pending mode\n 9.1.1463: Integer overflow in getmarklist() after linewise operation\n 9.1.1462: missing change from patch v9.1.1461\n 9.1.1461: tabpanel: tabpanel vanishes with popup menu\n 9.1.1460: MS-Windows: too many strlen() calls in os_win32.c\n 9.1.1459: xxd: coloring output is inefficient\n 9.1.1458: tabpanel: tabs not properly updated with \u0027stpl\u0027\n 9.1.1457: compile warning with tabpanelopt\n 9.1.1456: comment plugin fails toggling if \u0027cms\u0027 contains \\\n 9.1.1455: Haiku: dailog objects created with no reference\n 9.1.1454: tests: no test for pum at line break position\n 9.1.1453: tests: Test_geometry() may fail\n 9.1.1452: completion: redundant check for completion flags\n 9.1.1451: tabpanel rendering artifacts when scrolling\n 9.1.1450: Session has wrong arglist with :tcd and :arglocal\n 9.1.1449: typo in pum_display()\n 9.1.1448: tabpanel is not displayed correctly when msg_scrolled\n 9.1.1447: completion: crash when backspacing with fuzzy completion\n 9.1.1446: filetype: cuda-gdb config files are not recognized\n 9.1.1445: negative matchfuzzy scores although there is a match\n 9.1.1444: Unused assignment in set_fuzzy_score()\n 9.1.1443: potential buffer underflow in insertchar()\n 9.1.1442: tests: Test_diff_fold_redraw() is insufficient\n 9.1.1441: completion: code can be improved\n 9.1.1440: too many strlen() calls in os_win32.c\n 9.1.1439: Last diff folds not merged\n 9.1.1438: tests: Test_breakindent_list_split() fails\n 9.1.1437: MS-Windows: internal compile error in uc_list()\n 9.1.1436: GUI control code is displayed on the console on startup\n 9.1.1435: completion: various flaws in fuzzy completion\n 9.1.1434: MS-Windows: missing out-of-memory checks in os_win32.c\n 9.1.1433: Unnecessary :if when writing session\n 9.1.1432: GTK GUI: Buffer menu does not handle unicode correctly\n 9.1.1431: Hit-Enter Prompt when loading session files\n 9.1.1430: tabpanel may flicker in the GUI\n 9.1.1429: dragging outside the tabpanel changes tabpagenr\n 9.1.1428: completion: register completion needs cleanup\n 9.1.1427: rendering artifacts with the tabpanel\n 9.1.1426: completion: register contents not completed\n 9.1.1425: tabpanel: there are still some problems with the tabpanel\n 9.1.1424: PMenu selection broken with multi-line selection and limits\n 9.1.1423: :tag command not working correctly using Vim9 Script\n 9.1.1422: scheduling of complete function can be improved\n 9.1.1421: tests: need a test for the new-style tutor.tutor\n 9.1.1420: tests: could need some more tests for shebang lines\n 9.1.1419: It is difficult to ignore all but some events\n 9.1.1418: configures GUI auto detection favors GTK2\n 9.1.1417: missing info about register completion in complete_info()\n 9.1.1416: completion limits not respected for fuzzy completions\n 9.1.1415: potential use-after free when there is an error in \u0027tabpanel\u0027\n 9.1.1414: MS-Windows: compile warnings in os_win32.c\n 9.1.1413: spurious CursorHold triggered in GUI on startup\n 9.1.1412: tests: Test_tabpanel_tabonly() fails on larger screens\n 9.1.1411: crash when calling non-existing function for tabpanel\n 9.1.1410: out-of-bounds access with \u0027completefunc\u0027\n 9.1.1409: using f-flag in \u0027complete\u0027 conflicts with Neovim\n 9.1.1408: not easily possible to complete from register content\n 9.1.1407: Can\u0027t use getpos(\u0027v\u0027) in OptionSet when using setbufvar()\n 9.1.1406: crash when importing invalid tuple\n 9.1.1405: tests: no test for mapping with special keys in session file\n 9.1.1404: wrong link to Chapter 2 in new-tutor\n 9.1.1403: expansion of \u0027tabpanelopt\u0027 value adds wrong values\n 9.1.1402: multi-byte mappings not properly stored in session file\n 9.1.1401: list not materialized in prop_list()\n 9.1.1400: [security]: use-after-free when evaluating tuple fails\n 9.1.1399: tests: test_codestyle fails for auto-generated files\n 9.1.1398: completion: trunc does not follow Pmenu highlighting attributes\n 9.1.1397: tabpanel not correctly updated on :tabonly\n 9.1.1396: \u0027errorformat\u0027 is a global option\n 9.1.1395: search_stat not reset when pattern differs in case\n 9.1.1394: tabpanel not correctly redrawn on tabonly\n 9.1.1393: missing test for switching buffers and reusing curbuf\n 9.1.1392: missing patch number\n 9.1.1391: Vim does not have a vertical tabpanel\n 9.1.1390: style: more wrong indentation\n 9.1.1389: completion: still some issue when \u0027isexpand\u0027 contains a space\n 9.1.1388: Scrolling one line too far with \u0027nosmoothscroll\u0027 page scrolling\n 9.1.1387: memory leak when buflist_new() fails to reuse curbuf\n 9.1.1386: MS-Windows: some minor problems building on AARCH64\n 9.1.1385: inefficient loop for \u0027nosmoothscroll\u0027 scrolling\n 9.1.1384: still some problem with the new tutors filetype plugin\n 9.1.1383: completion: \u0027isexpand\u0027 option does not handle space char correct\n 9.1.1382: if_ruby: unused compiler warnings from ruby internals\n 9.1.1381: completion: cannot return to original text\n 9.1.1380: \u0027eventignorewin\u0027 only checked for current buffer\n 9.1.1379: MS-Windows: error when running evim when space in path\n 9.1.1378: sign without text overwrites number option\n 9.1.1377: patch v9.1.1370 causes some GTK warning messages\n 9.1.1376: quickfix dummy buffer may remain as dummy buffer\n 9.1.1375: [security]: possible heap UAF with quickfix dummy buffer\n 9.1.1374: completion: \u0027smartcase\u0027 not respected when filtering matches\n 9.1.1373: \u0027completeopt\u0027 checking logic can be simplified\n 9.1.1372: style: braces issues in various files\n 9.1.1371: style: indentation and brace issues in insexpand.c\n 9.1.1370: CI Tests favor GTK2 over GTK3\n 9.1.1369: configure still using autoconf 2.71\n 9.1.1368: GTK3 and GTK4 will drop numeric cursor support.\n 9.1.1367: too many strlen() calls in gui.c\n 9.1.1366: v9.1.1364 unintentionally changed sign.c and sound.c\n 9.1.1365: MS-Windows: compile warnings and too many strlen() calls\n 9.1.1364: style: more indentation issues\n 9.1.1363: style: inconsistent indentation in various files\n 9.1.1362: Vim9: type ignored when adding tuple to instance list var\n 9.1.1361: [security]: possible use-after-free when closing a buffer\n 9.1.1360: filetype: GNU Radio companion files are not recognized\n 9.1.1359: filetype: GNU Radio config files are not recognized\n 9.1.1358: if_lua: compile warnings with gcc15\n 9.1.1357: Vim incorrectly escapes tags with \"[\" in a help buffer\n 9.1.1356: Vim9: crash when unletting variable\n 9.1.1355: The pum_redraw() function is too complex\n 9.1.1354: tests: Test_terminalwinscroll_topline() fails on Windows\n 9.1.1353: missing change from v9.1.1350\n 9.1.1352: style: inconsistent indent in insexpand.c\n 9.1.1351: Return value of getcmdline() inconsistent in CmdlineLeavePre\n 9.1.1350: tests: typo in Test_CmdlineLeavePre_cabbr()\n 9.1.1349: CmdlineLeavePre may trigger twice\n 9.1.1348: still E315 with the terminal feature\n 9.1.1347: small problems with gui_w32.c\n 9.1.1346: missing out-of-memory check in textformat.c\n 9.1.1345: tests: Test_xxd_color2() test failure dump diff is misleading\n 9.1.1344: double free in f_complete_match() (after v9.1.1341)\n 9.1.1343: filetype: IPython files are not recognized\n 9.1.1342: Shebang filetype detection can be improved\n 9.1.1341: cannot define completion triggers\n 9.1.1340: cannot complete :filetype arguments\n 9.1.1339: missing out-of-memory checks for enc_to_utf16()/utf16_to_enc()\n 9.1.1338: Calling expand() interferes with cmdcomplete_info()\n 9.1.1337: Undo corrupted with \u0027completeopt\u0027 \"preinsert\" when switching buffer\n 9.1.1336: comment plugin does not support case-insensitive \u0027commentstring\u0027\n 9.1.1335: Coverity complains about Null pointer dereferences\n 9.1.1334: Coverity complains about unchecked return value\n 9.1.1333: Coverity: complains about unutilized variable\n 9.1.1332: Vim9: segfault when using super within a lambda\n 9.1.1331: Leaking memory with cmdcomplete()\n 9.1.1330: may receive E315 in terminal\n 9.1.1329: cannot get information about command line completion\n 9.1.1328: too many strlen() calls in indent.c\n 9.1.1327: filetype: nroff detection can be improved\n 9.1.1326: invalid cursor position after \u0027tagfunc\u0027\n 9.1.1325: tests: not checking error numbers properly\n 9.1.1324: undefined behaviour if X11 connection dies\n 9.1.1323: b:undo_ftplugin not executed when re-using buffer\n 9.1.1322: small delete register cannot paste multi-line correctly\n 9.1.1321: filetype: MS ixx and mpp files are not recognized\n 9.1.1320: filetype: alsoft config files are not recognized\n 9.1.1319: Various typos in the code, issue with test_inst_complete.vim\n 9.1.1318: tests: test_format fails\n 9.1.1317: noisy error when restoring folds from session fails\n 9.1.1316: missing memory allocation failure in os_mswin.c\n 9.1.1315: completion: issue with fuzzy completion and \u0027completefuzzycollect\u0027\n 9.1.1314: max allowed string width too small\n 9.1.1313: compile warning about uninitialized value\n 9.1.1312: tests: Test_backupskip() fails when HOME is defined\n 9.1.1311: completion: not possible to limit number of matches\n 9.1.1310: completion: redundant check for preinsert effect\n 9.1.1309: tests: no test for \u0027pummaxwidth\u0027 with non-truncated \"kind\"\n 9.1.1308: completion: cannot order matches by distance to cursor\n 9.1.1307: make syntax does not reliably detect different flavors\n 9.1.1306: completion menu rendering can be improved\n 9.1.1305: completion menu active after switching windows/tabs\n 9.1.1304: filetype: some man files are not recognized\n 9.1.1303: missing out-of-memory check in linematch.c\n 9.1.1302: Coverity warns about using uninitialized value\n 9.1.1301: completion: cannot configure completion functions with \u0027complete\u0027\n 9.1.1300: wrong detection of -inf\n 9.1.1299: filetype: mbsyncrc files are not recognized\n 9.1.1298: define_function() is too long\n 9.1.1297: Ctrl-D scrolling can get stuck\n 9.1.1296: completion: incorrect truncation logic\n 9.1.1295: clientserver: does not handle :stopinsert correctly\n 9.1.1294: gui tabline menu does not use confirm when closing tabs\n 9.1.1293: comment plugin does not handle \u0027exclusive\u0027 selection for comment object\n 9.1.1292: statusline not correctly evaluated\n 9.1.1291: too many strlen() calls in buffer.c\n 9.1.1290: tests: missing cleanup in test_filetype.vim\n 9.1.1289: tests: no test for matchparen plugin with WinScrolled event\n 9.1.1288: Using wrong window in ll_resize_stack()\n 9.1.1287: quickfix code can be further improved\n 9.1.1286: filetype: help files not detected when \u0027iskeyword\u0027 includes \":\"\n 9.1.1285: Vim9: no error message for missing method after \"super.\"\n 9.1.1284: not possible to configure pum truncation char\n 9.1.1283: quickfix stack is limited to 10 items\n 9.1.1282: Build and test failure without job feature\n 9.1.1281: extra newline output when editing stdin\n 9.1.1280: trailing additional semicolon in get_matches_in_str()\n 9.1.1279: Vim9: null_object and null_class are no reserved names\n 9.1.1278: Vim9: too long functions in vim9type.c\n 9.1.1277: tests: trailing comment char in test_popupwin\n 9.1.1276: inline word diff treats multibyte chars as word char\n 9.1.1275: MS-Windows: Not possible to pass additional flags to Make_mvc\n 9.1.1274: Vim9: no support for object\u003ctype\u003e as variable type\n 9.1.1273: Coverity warns about using uninitialized value\n 9.1.1272: completion: in keyword completion Ctrl_P cannot go back after Ctrl_N\n 9.1.1271: filetype: Power Query files are not recognized\n 9.1.1270: missing out-of-memory checks in buffer.c\n 9.1.1269: completion: compl_shown_match is updated when starting keyword completion\n 9.1.1268: filetype: dax files are not recognized\n 9.1.1267: Vim9: no support for type list/dict\u003cobject\u003cany\u003e\u003e\n 9.1.1266: MS-Windows: type conversion warnings\n 9.1.1265: tests: no tests for typing normal char during completion\n 9.1.1264: Vim9: error when comparing objects\n 9.1.1263: string length wrong in get_last_inserted_save()\n 9.1.1262: heap-buffer-overflow with narrow \u0027pummaxwidth\u0027 value\n 9.1.1261: No test for \u0027pummaxwidth\u0027 non-truncated items\n 9.1.1260: Hang when filtering buffer with NUL bytes\n 9.1.1259: some issues with comment package and tailing spaces\n 9.1.1258: regexp: max \\U and \\%U value is limited by INT_MAX\n 9.1.1257: Mixing vim_strsize() with mb_ptr2cells() in pum_redraw()\n 9.1.1256: if_python: duplicate tuple data entries\n 9.1.1255: missing test condition for \u0027pummaxwidth\u0027 setting\n 9.1.1254: need more tests for the comment plugin\n 9.1.1253: abort when closing window with attached quickfix data\n 9.1.1252: typos in code and docs related to \u0027diffopt\u0027 \"inline:\"\n 9.1.1251: if_python: build error with tuples and dynamic python\n 9.1.1250: cannot set the maximum popup menu width\n 9.1.1249: tests: no test that \u0027listchars\u0027 \"eol\" doesn\u0027t affect \"gM\"\n 9.1.1248: compile error when building without FEAT_QUICKFIX\n 9.1.1247: fragile setup to get (preferred) keys from key_name_entry\n 9.1.1246: coverity complains about some changes in v9.1.1243\n 9.1.1245: need some more tests for curly braces evaluation\n 9.1.1244: part of patch v9.1.1242 was wrong\n 9.1.1243: diff mode is lacking for changes within lines\n 9.1.1242: Crash when evaluating variable name\n 9.1.1241: wrong preprocessort indentation in term.c\n 9.1.1240: Regression with ic/ac text objects and comment plugin\n 9.1.1239: if_python: no tuple data type support\n 9.1.1238: wrong cursor column with \u0027set splitkeep=screen\u0027\n 9.1.1237: Compile error with C89 compiler in term.c\n 9.1.1236: tests: test_comments leaves swapfiles around\n 9.1.1235: cproto files are outdated\n 9.1.1234: Compile error when SIZE_MAX is not defined\n 9.1.1233: Coverity warns about NULL pointer when triggering WinResized\n 9.1.1232: Vim script is missing the tuple data type\n 9.1.1231: filetype: SPA JSON files are not recognized\n 9.1.1230: inconsistent CTRL-C behaviour for popup windows\n 9.1.1229: the comment plugin can be improved\n 9.1.1228: completion: current position column wrong after got a match\n 9.1.1227: no tests for the comment package\n 9.1.1226: \"shellcmdline\" completion doesn\u0027t work with input()\n 9.1.1225: extra NULL check in VIM_CLEAR()\n 9.1.1224: cannot :put while keeping indent\n 9.1.1223: wrong translation used for encoding failures\n 9.1.1222: using wrong length for last inserted string\n 9.1.1221: Wrong cursor pos when leaving Insert mode just after \u0027autoindent\u0027\n 9.1.1220: filetype: uv.lock file not recognized\n 9.1.1219: Strange error with wrong type for matchfuzzy() \"camelcase\"\n 9.1.1218: missing out-of-memory check in filepath.c\n 9.1.1217: tests: typos in test_matchfuzzy.vim\n 9.1.1216: Pasting the \u0027.\u0027 register multiple times may not work\n 9.1.1215: Patch 9.1.1213 has some issues\n 9.1.1214: matchfuzzy() can be improved for camel case matches\n 9.1.1213: cannot :put while keeping indent\n 9.1.1212: too many strlen() calls in edit.c\n 9.1.1212: filetype: logrotate\u0027d pacmanlogs are not recognized\n 9.1.1211: TabClosedPre is triggered just before the tab is being freed\n 9.1.1210: translation(ru): missing Russian translation for the new tutor\n 9.1.1209: colorcolumn not drawn after virtual text lines\n 9.1.1208: MS-Windows: not correctly restoring alternate screen on Win 10\n 9.1.1207: MS-Windows: build warning in filepath.c\n 9.1.1206: tests: test_filetype fails when a file is a directory\n 9.1.1205: completion: preinserted text not removed when closing pum\n 9.1.1204: MS-Windows: crash when passing long string to expand()\n 9.1.1203: matchparen keeps cursor on case label in sh filetype\n 9.1.1202: Missing TabClosedPre autocommand\n 9.1.1201: \u0027completefuzzycollect\u0027 does not handle dictionary correctly\n 9.1.1200: cmdline pum not cleared for input() completion\n 9.1.1199: gvim uses hardcoded xpm icon file\n 9.1.1198: [security]: potential data loss with zip.vim\n 9.1.1197: process_next_cpt_value() uses wrong condition\n 9.1.1196: filetype: config files for container tools are not recognized\n 9.1.1195: inside try-block: fn body executed with default arg undefined\n 9.1.1194: filetype: false positive help filetype detection\n 9.1.1193: Unnecessary use of STRCAT() in au_event_disable()\n 9.1.1192: Vim crashes with term response debug logging enabled\n 9.1.1191: tests: test for patch 9.1.1186 doesn\u0027t fail without the patch\n 9.1.1190: C indentation does not detect multibyte labels\n 9.1.1189: if_python: build error due to incompatible pointer types\n 9.1.1188: runtime(tera): tera support can be improved\n 9.1.1187: matchparen plugin wrong highlights shell case statement\n 9.1.1186: filetype: help files in git repos are not detected\n 9.1.1185: endless loop with completefuzzycollect and no match found\n 9.1.1184: Unnecessary use of vim_tolower() in vim_strnicmp_asc()\n 9.1.1083: \"above\" virtual text breaks cursorlineopt=number\n 9.1.1182: No cmdline completion for \u0027completefuzzycollect\u0027\n 9.1.1181: Unnecessary STRLEN() calls in insexpand.c\n 9.1.1180: short-description\n 9.1.1179: too many strlen() calls in misc2.c\n 9.1.1178: not possible to generate completion candidates using fuzzy matching\n 9.1.1177: filetype: tera files not detected\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-457",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20696-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20696-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520696-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20696-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-September/041757.html"
},
{
"category": "self",
"summary": "SUSE Bug 1246602",
"url": "https://bugzilla.suse.com/1246602"
},
{
"category": "self",
"summary": "SUSE Bug 1246604",
"url": "https://bugzilla.suse.com/1246604"
},
{
"category": "self",
"summary": "SUSE Bug 1247938",
"url": "https://bugzilla.suse.com/1247938"
},
{
"category": "self",
"summary": "SUSE Bug 1247939",
"url": "https://bugzilla.suse.com/1247939"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53905 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53905/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-53906 page",
"url": "https://www.suse.com/security/cve/CVE-2025-53906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55158/"
}
],
"title": "Security update for vim",
"tracking": {
"current_release_date": "2025-09-11T10:30:52Z",
"generator": {
"date": "2025-09-11T10:30:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20696-1",
"initial_release_date": "2025-09-11T10:30:52Z",
"revision_history": [
{
"date": "2025-09-11T10:30:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "vim-small-9.1.1629-1.1.aarch64",
"product": {
"name": "vim-small-9.1.1629-1.1.aarch64",
"product_id": "vim-small-9.1.1629-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-data-common-9.1.1629-1.1.noarch",
"product": {
"name": "vim-data-common-9.1.1629-1.1.noarch",
"product_id": "vim-data-common-9.1.1629-1.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-small-9.1.1629-1.1.s390x",
"product": {
"name": "vim-small-9.1.1629-1.1.s390x",
"product_id": "vim-small-9.1.1629-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-small-9.1.1629-1.1.x86_64",
"product": {
"name": "vim-small-9.1.1629-1.1.x86_64",
"product_id": "vim-small-9.1.1629-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.1.1629-1.1.noarch as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:vim-data-common-9.1.1629-1.1.noarch"
},
"product_reference": "vim-data-common-9.1.1629-1.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-1.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.aarch64"
},
"product_reference": "vim-small-9.1.1629-1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-1.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.s390x"
},
"product_reference": "vim-small-9.1.1629-1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.1.1629-1.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.x86_64"
},
"product_reference": "vim-small-9.1.1629-1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53905"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim\u0027s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:vim-data-common-9.1.1629-1.1.noarch",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.aarch64",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.s390x",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53905",
"url": "https://www.suse.com/security/cve/CVE-2025-53905"
},
{
"category": "external",
"summary": "SUSE Bug 1246604 for CVE-2025-53905",
"url": "https://bugzilla.suse.com/1246604"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:vim-data-common-9.1.1629-1.1.noarch",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.aarch64",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.s390x",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:vim-data-common-9.1.1629-1.1.noarch",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.aarch64",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.s390x",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-11T10:30:52Z",
"details": "moderate"
}
],
"title": "CVE-2025-53905"
},
{
"cve": "CVE-2025-53906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-53906"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim\u0027s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:vim-data-common-9.1.1629-1.1.noarch",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.aarch64",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.s390x",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-53906",
"url": "https://www.suse.com/security/cve/CVE-2025-53906"
},
{
"category": "external",
"summary": "SUSE Bug 1246602 for CVE-2025-53906",
"url": "https://bugzilla.suse.com/1246602"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:vim-data-common-9.1.1629-1.1.noarch",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.aarch64",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.s390x",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:vim-data-common-9.1.1629-1.1.noarch",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.aarch64",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.s390x",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-11T10:30:52Z",
"details": "moderate"
}
],
"title": "CVE-2025-53906"
},
{
"cve": "CVE-2025-55157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55157"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim\u0027s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:vim-data-common-9.1.1629-1.1.noarch",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.aarch64",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.s390x",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55157",
"url": "https://www.suse.com/security/cve/CVE-2025-55157"
},
{
"category": "external",
"summary": "SUSE Bug 1247938 for CVE-2025-55157",
"url": "https://bugzilla.suse.com/1247938"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:vim-data-common-9.1.1629-1.1.noarch",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.aarch64",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.s390x",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:vim-data-common-9.1.1629-1.1.noarch",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.aarch64",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.s390x",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-11T10:30:52Z",
"details": "moderate"
}
],
"title": "CVE-2025-55157"
},
{
"cve": "CVE-2025-55158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55158"
}
],
"notes": [
{
"category": "general",
"text": "Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1406, when processing nested tuples during Vim9 script import operations, an error during evaluation can trigger a double-free in Vim\u0027s internal typed value (typval_T) management. Specifically, the clear_tv() function may attempt to free memory that has already been deallocated, due to improper lifetime handling in the handle_import / ex_import code paths. The vulnerability can only be triggered if a user explicitly opens and executes a specially crafted Vim script. This issue has been patched in version 9.1.1406.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:vim-data-common-9.1.1629-1.1.noarch",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.aarch64",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.s390x",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55158",
"url": "https://www.suse.com/security/cve/CVE-2025-55158"
},
{
"category": "external",
"summary": "SUSE Bug 1247939 for CVE-2025-55158",
"url": "https://bugzilla.suse.com/1247939"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:vim-data-common-9.1.1629-1.1.noarch",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.aarch64",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.s390x",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:vim-data-common-9.1.1629-1.1.noarch",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.aarch64",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.s390x",
"SUSE Linux Micro 6.0:vim-small-9.1.1629-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-11T10:30:52Z",
"details": "moderate"
}
],
"title": "CVE-2025-55158"
}
]
}
rhsa-2025:17913
Vulnerability from csaf_redhat
Published
2025-10-14 05:32
Modified
2025-11-06 23:42
Summary
Red Hat Security Advisory: vim security update
Notes
Topic
An update for vim is now available for Red Hat Enterprise Linux 10.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Vim path traversal (CVE-2025-53906)
* vim: Vim path traversial (CVE-2025-53905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for vim is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Vim path traversal (CVE-2025-53906)\n\n* vim: Vim path traversial (CVE-2025-53905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:17913",
"url": "https://access.redhat.com/errata/RHSA-2025:17913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2380360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380360"
},
{
"category": "external",
"summary": "2380362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380362"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_17913.json"
}
],
"title": "Red Hat Security Advisory: vim security update",
"tracking": {
"current_release_date": "2025-11-06T23:42:31+00:00",
"generator": {
"date": "2025-11-06T23:42:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2025:17913",
"initial_release_date": "2025-10-14T05:32:21+00:00",
"revision_history": [
{
"date": "2025-10-14T05:32:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-14T05:32:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:42:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.0"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-2:9.1.083-5.el10_0.1.src",
"product": {
"name": "vim-2:9.1.083-5.el10_0.1.src",
"product_id": "vim-2:9.1.083-5.el10_0.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim@9.1.083-5.el10_0.1?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-data-2:9.1.083-5.el10_0.1.noarch",
"product": {
"name": "vim-data-2:9.1.083-5.el10_0.1.noarch",
"product_id": "vim-data-2:9.1.083-5.el10_0.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-data@9.1.083-5.el10_0.1?arch=noarch\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"product": {
"name": "vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"product_id": "vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-filesystem@9.1.083-5.el10_0.1?arch=noarch\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"product": {
"name": "vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"product_id": "vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@9.1.083-5.el10_0.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"product": {
"name": "vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"product_id": "vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@9.1.083-5.el10_0.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"product": {
"name": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"product_id": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@9.1.083-5.el10_0.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"product": {
"name": "vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"product_id": "vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@9.1.083-5.el10_0.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"product": {
"name": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"product_id": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@9.1.083-5.el10_0.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"product": {
"name": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"product_id": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@9.1.083-5.el10_0.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"product": {
"name": "xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"product_id": "xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xxd-debuginfo@9.1.083-5.el10_0.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"product": {
"name": "vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"product_id": "vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@9.1.083-5.el10_0.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:9.1.083-5.el10_0.1.aarch64",
"product": {
"name": "vim-common-2:9.1.083-5.el10_0.1.aarch64",
"product_id": "vim-common-2:9.1.083-5.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@9.1.083-5.el10_0.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"product": {
"name": "vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"product_id": "vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@9.1.083-5.el10_0.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "xxd-2:9.1.083-5.el10_0.1.aarch64",
"product": {
"name": "xxd-2:9.1.083-5.el10_0.1.aarch64",
"product_id": "xxd-2:9.1.083-5.el10_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xxd@9.1.083-5.el10_0.1?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"product": {
"name": "vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"product_id": "vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@9.1.083-5.el10_0.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"product": {
"name": "vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"product_id": "vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@9.1.083-5.el10_0.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"product": {
"name": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"product_id": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@9.1.083-5.el10_0.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"product": {
"name": "vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"product_id": "vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@9.1.083-5.el10_0.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"product": {
"name": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"product_id": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@9.1.083-5.el10_0.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"product": {
"name": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"product_id": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@9.1.083-5.el10_0.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"product": {
"name": "xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"product_id": "xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xxd-debuginfo@9.1.083-5.el10_0.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"product": {
"name": "vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"product_id": "vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@9.1.083-5.el10_0.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"product": {
"name": "vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"product_id": "vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@9.1.083-5.el10_0.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"product": {
"name": "vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"product_id": "vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@9.1.083-5.el10_0.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "xxd-2:9.1.083-5.el10_0.1.ppc64le",
"product": {
"name": "xxd-2:9.1.083-5.el10_0.1.ppc64le",
"product_id": "xxd-2:9.1.083-5.el10_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xxd@9.1.083-5.el10_0.1?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"product": {
"name": "vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"product_id": "vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@9.1.083-5.el10_0.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"product": {
"name": "vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"product_id": "vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@9.1.083-5.el10_0.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"product": {
"name": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"product_id": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@9.1.083-5.el10_0.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"product": {
"name": "vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"product_id": "vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@9.1.083-5.el10_0.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"product": {
"name": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"product_id": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@9.1.083-5.el10_0.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"product": {
"name": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"product_id": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@9.1.083-5.el10_0.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"product": {
"name": "xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"product_id": "xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xxd-debuginfo@9.1.083-5.el10_0.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"product": {
"name": "vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"product_id": "vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@9.1.083-5.el10_0.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:9.1.083-5.el10_0.1.x86_64",
"product": {
"name": "vim-common-2:9.1.083-5.el10_0.1.x86_64",
"product_id": "vim-common-2:9.1.083-5.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@9.1.083-5.el10_0.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"product": {
"name": "vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"product_id": "vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@9.1.083-5.el10_0.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "xxd-2:9.1.083-5.el10_0.1.x86_64",
"product": {
"name": "xxd-2:9.1.083-5.el10_0.1.x86_64",
"product_id": "xxd-2:9.1.083-5.el10_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xxd@9.1.083-5.el10_0.1?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"product": {
"name": "vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"product_id": "vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@9.1.083-5.el10_0.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"product": {
"name": "vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"product_id": "vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@9.1.083-5.el10_0.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"product": {
"name": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"product_id": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@9.1.083-5.el10_0.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"product": {
"name": "vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"product_id": "vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@9.1.083-5.el10_0.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"product": {
"name": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"product_id": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@9.1.083-5.el10_0.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"product": {
"name": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"product_id": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@9.1.083-5.el10_0.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"product": {
"name": "xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"product_id": "xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xxd-debuginfo@9.1.083-5.el10_0.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-2:9.1.083-5.el10_0.1.s390x",
"product": {
"name": "vim-X11-2:9.1.083-5.el10_0.1.s390x",
"product_id": "vim-X11-2:9.1.083-5.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@9.1.083-5.el10_0.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:9.1.083-5.el10_0.1.s390x",
"product": {
"name": "vim-common-2:9.1.083-5.el10_0.1.s390x",
"product_id": "vim-common-2:9.1.083-5.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@9.1.083-5.el10_0.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"product": {
"name": "vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"product_id": "vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@9.1.083-5.el10_0.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "xxd-2:9.1.083-5.el10_0.1.s390x",
"product": {
"name": "xxd-2:9.1.083-5.el10_0.1.s390x",
"product_id": "xxd-2:9.1.083-5.el10_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xxd@9.1.083-5.el10_0.1?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-2:9.1.083-5.el10_0.1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-2:9.1.083-5.el10_0.1.src"
},
"product_reference": "vim-2:9.1.083-5.el10_0.1.src",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-X11-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-common-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-common-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-common-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-2:9.1.083-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch"
},
"product_reference": "vim-data-2:9.1.083-5.el10_0.1.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:9.1.083-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch"
},
"product_reference": "vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xxd-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "xxd-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xxd-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "xxd-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xxd-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "xxd-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xxd-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "xxd-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-2:9.1.083-5.el10_0.1.src as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-2:9.1.083-5.el10_0.1.src"
},
"product_reference": "vim-2:9.1.083-5.el10_0.1.src",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-X11-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-common-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-common-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-common-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-2:9.1.083-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch"
},
"product_reference": "vim-data-2:9.1.083-5.el10_0.1.noarch",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:9.1.083-5.el10_0.1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch"
},
"product_reference": "vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xxd-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "xxd-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xxd-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "xxd-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xxd-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "xxd-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xxd-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "xxd-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64"
},
"product_reference": "xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le"
},
"product_reference": "xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x"
},
"product_reference": "xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
},
"product_reference": "xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53905",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-07-15T21:01:19.770241+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380362"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: Vim path traversial",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation enforces strict path constraints, rejecting directory traversal attempts or unauthorized file access. Runtime environments restrict code execution to predefined privilege levels, preventing escalation from traversal exploits. Configuration settings limit accessible directories and enforce execution boundaries to reduce the influence of user input on file system behavior. Application components are developed and validated against secure coding standards that explicitly prevent path manipulation, further minimizing exploitation risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z:vim-2:9.1.083-5.el10_0.1.src",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-2:9.1.083-5.el10_0.1.src",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-53905"
},
{
"category": "external",
"summary": "RHBZ#2380362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380362"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53905"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239",
"url": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr",
"url": "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr"
}
],
"release_date": "2025-07-15T20:48:34.764000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-14T05:32:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z:vim-2:9.1.083-5.el10_0.1.src",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-2:9.1.083-5.el10_0.1.src",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17913"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.0.Z:vim-2:9.1.083-5.el10_0.1.src",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-2:9.1.083-5.el10_0.1.src",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z:vim-2:9.1.083-5.el10_0.1.src",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-2:9.1.083-5.el10_0.1.src",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: Vim path traversial"
},
{
"cve": "CVE-2025-53906",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-07-15T21:01:15.057182+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380360"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: Vim path traversal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation enforces strict path constraints, rejecting directory traversal attempts or unauthorized file access. Runtime environments restrict code execution to predefined privilege levels, preventing escalation from traversal exploits. Configuration settings limit accessible directories and enforce execution boundaries to reduce the influence of user input on file system behavior. Application components are developed and validated against secure coding standards that explicitly prevent path manipulation, further minimizing exploitation risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z:vim-2:9.1.083-5.el10_0.1.src",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-2:9.1.083-5.el10_0.1.src",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-53906"
},
{
"category": "external",
"summary": "RHBZ#2380360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380360"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53906",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53906"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8",
"url": "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/security/advisories/GHSA-r2fw-9cw4-mj86",
"url": "https://github.com/vim/vim/security/advisories/GHSA-r2fw-9cw4-mj86"
}
],
"release_date": "2025-07-15T20:52:40.137000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-14T05:32:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z:vim-2:9.1.083-5.el10_0.1.src",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-2:9.1.083-5.el10_0.1.src",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17913"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.0.Z:vim-2:9.1.083-5.el10_0.1.src",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-2:9.1.083-5.el10_0.1.src",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z:vim-2:9.1.083-5.el10_0.1.src",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"AppStream-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-2:9.1.083-5.el10_0.1.src",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-X11-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-X11-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-common-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-data-2:9.1.083-5.el10_0.1.noarch",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-debugsource-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-enhanced-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-enhanced-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-filesystem-2:9.1.083-5.el10_0.1.noarch",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-minimal-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:vim-minimal-debuginfo-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:xxd-2:9.1.083-5.el10_0.1.x86_64",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.aarch64",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.ppc64le",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.s390x",
"BaseOS-10.0.Z:xxd-debuginfo-2:9.1.083-5.el10_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: Vim path traversal"
}
]
}
rhsa-2025:17715
Vulnerability from csaf_redhat
Published
2025-10-09 19:23
Modified
2025-11-06 23:42
Summary
Red Hat Security Advisory: vim security update
Notes
Topic
An update for vim is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Vim path traversal (CVE-2025-53906)
* vim: Vim path traversial (CVE-2025-53905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for vim is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Vim path traversal (CVE-2025-53906)\n\n* vim: Vim path traversial (CVE-2025-53905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:17715",
"url": "https://access.redhat.com/errata/RHSA-2025:17715"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2380360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380360"
},
{
"category": "external",
"summary": "2380362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380362"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_17715.json"
}
],
"title": "Red Hat Security Advisory: vim security update",
"tracking": {
"current_release_date": "2025-11-06T23:42:30+00:00",
"generator": {
"date": "2025-11-06T23:42:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2025:17715",
"initial_release_date": "2025-10-09T19:23:45+00:00",
"revision_history": [
{
"date": "2025-10-09T19:23:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-09T19:23:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:42:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.0.1763-21.el8_10.aarch64",
"product": {
"name": "vim-X11-2:8.0.1763-21.el8_10.aarch64",
"product_id": "vim-X11-2:8.0.1763-21.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.0.1763-21.el8_10?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.0.1763-21.el8_10.aarch64",
"product": {
"name": "vim-common-2:8.0.1763-21.el8_10.aarch64",
"product_id": "vim-common-2:8.0.1763-21.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.0.1763-21.el8_10?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"product": {
"name": "vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"product_id": "vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.0.1763-21.el8_10?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"product": {
"name": "vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"product_id": "vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.0.1763-21.el8_10?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"product": {
"name": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"product_id": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-21.el8_10?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"product": {
"name": "vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"product_id": "vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-21.el8_10?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"product": {
"name": "vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"product_id": "vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.0.1763-21.el8_10?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"product": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"product_id": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-21.el8_10?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"product": {
"name": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"product_id": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-21.el8_10?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"product": {
"name": "vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"product_id": "vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.0.1763-21.el8_10?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"product": {
"name": "vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"product_id": "vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.0.1763-21.el8_10?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.0.1763-21.el8_10.ppc64le",
"product": {
"name": "vim-common-2:8.0.1763-21.el8_10.ppc64le",
"product_id": "vim-common-2:8.0.1763-21.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.0.1763-21.el8_10?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"product": {
"name": "vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"product_id": "vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.0.1763-21.el8_10?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"product": {
"name": "vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"product_id": "vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.0.1763-21.el8_10?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"product": {
"name": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"product_id": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-21.el8_10?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"product": {
"name": "vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"product_id": "vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-21.el8_10?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"product": {
"name": "vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"product_id": "vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.0.1763-21.el8_10?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"product": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"product_id": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-21.el8_10?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"product": {
"name": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"product_id": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-21.el8_10?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"product": {
"name": "vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"product_id": "vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.0.1763-21.el8_10?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.0.1763-21.el8_10.x86_64",
"product": {
"name": "vim-X11-2:8.0.1763-21.el8_10.x86_64",
"product_id": "vim-X11-2:8.0.1763-21.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.0.1763-21.el8_10?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.0.1763-21.el8_10.x86_64",
"product": {
"name": "vim-common-2:8.0.1763-21.el8_10.x86_64",
"product_id": "vim-common-2:8.0.1763-21.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.0.1763-21.el8_10?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"product": {
"name": "vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"product_id": "vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.0.1763-21.el8_10?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"product": {
"name": "vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"product_id": "vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.0.1763-21.el8_10?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"product": {
"name": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"product_id": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-21.el8_10?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"product": {
"name": "vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"product_id": "vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-21.el8_10?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"product": {
"name": "vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"product_id": "vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.0.1763-21.el8_10?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"product": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"product_id": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-21.el8_10?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"product": {
"name": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"product_id": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-21.el8_10?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"product": {
"name": "vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"product_id": "vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.0.1763-21.el8_10?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.0.1763-21.el8_10.s390x",
"product": {
"name": "vim-X11-2:8.0.1763-21.el8_10.s390x",
"product_id": "vim-X11-2:8.0.1763-21.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.0.1763-21.el8_10?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.0.1763-21.el8_10.s390x",
"product": {
"name": "vim-common-2:8.0.1763-21.el8_10.s390x",
"product_id": "vim-common-2:8.0.1763-21.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.0.1763-21.el8_10?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"product": {
"name": "vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"product_id": "vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.0.1763-21.el8_10?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"product": {
"name": "vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"product_id": "vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.0.1763-21.el8_10?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"product": {
"name": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"product_id": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-21.el8_10?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"product": {
"name": "vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"product_id": "vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-21.el8_10?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"product": {
"name": "vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"product_id": "vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.0.1763-21.el8_10?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"product": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"product_id": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-21.el8_10?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"product": {
"name": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"product_id": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-21.el8_10?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.0.1763-21.el8_10.s390x",
"product": {
"name": "vim-minimal-2:8.0.1763-21.el8_10.s390x",
"product_id": "vim-minimal-2:8.0.1763-21.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.0.1763-21.el8_10?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"product": {
"name": "vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"product_id": "vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-filesystem@8.0.1763-21.el8_10?arch=noarch\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-2:8.0.1763-21.el8_10.src",
"product": {
"name": "vim-2:8.0.1763-21.el8_10.src",
"product_id": "vim-2:8.0.1763-21.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim@8.0.1763-21.el8_10?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-2:8.0.1763-21.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src"
},
"product_reference": "vim-2:8.0.1763-21.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-X11-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-X11-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-X11-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-common-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-common-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-common-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-common-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:8.0.1763-21.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch"
},
"product_reference": "vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-minimal-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-2:8.0.1763-21.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src"
},
"product_reference": "vim-2:8.0.1763-21.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-X11-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-X11-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-X11-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-common-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-common-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-common-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-common-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:8.0.1763-21.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch"
},
"product_reference": "vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-minimal-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53905",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-07-15T21:01:19.770241+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380362"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: Vim path traversial",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation enforces strict path constraints, rejecting directory traversal attempts or unauthorized file access. Runtime environments restrict code execution to predefined privilege levels, preventing escalation from traversal exploits. Configuration settings limit accessible directories and enforce execution boundaries to reduce the influence of user input on file system behavior. Application components are developed and validated against secure coding standards that explicitly prevent path manipulation, further minimizing exploitation risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-53905"
},
{
"category": "external",
"summary": "RHBZ#2380362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380362"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53905"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239",
"url": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr",
"url": "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr"
}
],
"release_date": "2025-07-15T20:48:34.764000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-09T19:23:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17715"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: Vim path traversial"
},
{
"cve": "CVE-2025-53906",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-07-15T21:01:15.057182+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380360"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: Vim path traversal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation enforces strict path constraints, rejecting directory traversal attempts or unauthorized file access. Runtime environments restrict code execution to predefined privilege levels, preventing escalation from traversal exploits. Configuration settings limit accessible directories and enforce execution boundaries to reduce the influence of user input on file system behavior. Application components are developed and validated against secure coding standards that explicitly prevent path manipulation, further minimizing exploitation risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-53906"
},
{
"category": "external",
"summary": "RHBZ#2380360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380360"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53906",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53906"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8",
"url": "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/security/advisories/GHSA-r2fw-9cw4-mj86",
"url": "https://github.com/vim/vim/security/advisories/GHSA-r2fw-9cw4-mj86"
}
],
"release_date": "2025-07-15T20:52:40.137000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-09T19:23:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17715"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-2:8.0.1763-21.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-debugsource-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-filesystem-2:8.0.1763-21.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-2:8.0.1763-21.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.0.1763-21.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: Vim path traversal"
}
]
}
rhsa-2025:19088
Vulnerability from csaf_redhat
Published
2025-10-23 19:26
Modified
2025-11-06 23:15
Summary
Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage
Notes
Topic
A Subscription Management tool for finding and reporting Red Hat product usage
Details
Red Hat Discovery, also known as Discovery, is an inspection and reporting tool that finds,
identifies, and reports environment data, or facts, such as the number of physical and virtual
systems on a network, their operating systems, and relevant configuration data stored within
them. Discovery also identifies and reports more detailed facts for some versions of key
Red Hat packages and products that it finds in the network.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A Subscription Management tool for finding and reporting Red Hat product usage",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Discovery, also known as Discovery, is an inspection and reporting tool that finds,\nidentifies, and reports environment data, or facts, such as the number of physical and virtual\nsystems on a network, their operating systems, and relevant configuration data stored within\nthem. Discovery also identifies and reports more detailed facts for some versions of key\nRed Hat packages and products that it finds in the network.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:19088",
"url": "https://access.redhat.com/errata/RHSA-2025:19088"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-32988",
"url": "https://access.redhat.com/security/cve/CVE-2025-32988"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-32989",
"url": "https://access.redhat.com/security/cve/CVE-2025-32989"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-32990",
"url": "https://access.redhat.com/security/cve/CVE-2025-32990"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-53905",
"url": "https://access.redhat.com/security/cve/CVE-2025-53905"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-53906",
"url": "https://access.redhat.com/security/cve/CVE-2025-53906"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6395",
"url": "https://access.redhat.com/security/cve/CVE-2025-6395"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/subscription_central/1-latest/#Discovery",
"url": "https://docs.redhat.com/en/documentation/subscription_central/1-latest/#Discovery"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_19088.json"
}
],
"title": "Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage",
"tracking": {
"current_release_date": "2025-11-06T23:15:11+00:00",
"generator": {
"date": "2025-11-06T23:15:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2025:19088",
"initial_release_date": "2025-10-23T19:26:05+00:00",
"revision_history": [
{
"date": "2025-10-23T19:26:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-23T19:26:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:15:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Discovery 2",
"product": {
"name": "Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:discovery:2::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Discovery"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"product": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"product_id": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-server-rhel9@sha256%3A54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208?arch=amd64\u0026repository_url=registry.redhat.io/discovery\u0026tag=2.3.0-1760553895"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64",
"product": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64",
"product_id": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-ui-rhel9@sha256%3A4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65?arch=amd64\u0026repository_url=registry.redhat.io/discovery\u0026tag=2.3.0-1760554384"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64",
"product": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64",
"product_id": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-server-rhel9@sha256%3Af4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2?arch=arm64\u0026repository_url=registry.redhat.io/discovery\u0026tag=2.3.0-1760553895"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"product": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"product_id": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-ui-rhel9@sha256%3A435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648?arch=arm64\u0026repository_url=registry.redhat.io/discovery\u0026tag=2.3.0-1760554384"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64"
},
"product_reference": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64"
},
"product_reference": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64"
},
"product_reference": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
},
"product_reference": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64",
"relates_to_product_reference": "Red Hat Discovery 2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-6395",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-07-07T09:30:13.037000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2376755"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-476: NULL Pointer Dereference vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform incorporates secure engineering principles and controls to enforce secure coding practices, including proper memory handling and error checking, reducing the likelihood of null pointer dereference vulnerabilities. Coding standards, tools, and processes support early detection and prevention of memory-related flaws. Static code analysis identifies null dereference and related issues during development, while system monitoring detects memory errors and anomalous behavior in the event of exploitation. Additionally, the platform leverages memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to strengthen resilience against memory-related vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6395"
},
{
"category": "external",
"summary": "RHBZ#2376755",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2376755"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6395",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6395"
}
],
"release_date": "2025-07-10T07:56:53.029000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T19:26:05+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19088"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: NULL pointer dereference in _gnutls_figure_common_ciphersuite()"
},
{
"cve": "CVE-2025-32988",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2025-04-15T01:21:36.833000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2359622"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure.\n\nThis vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: Vulnerability in GnuTLS otherName SAN export",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-415: Double Free vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings necessary for operational requirements. Baseline configurations and system controls ensure secure software configurations, while least functionality reduces the attack surface by enforcing safe memory allocation and deallocation practices, lowering the risk of double-free vulnerabilities. The environment employs IPS/IDS and antimalware solutions to detect and prevent malicious code while providing real-time visibility into memory usage, reducing the risk of arbitrary code execution. Static code analysis and peer reviews enforce strong input validation and error handling, minimizing the risk of denial-of-service (DoS) attacks. In the event of successful exploitation, process isolation prevents compromised workloads from accessing other processes\u2019 memory, containing the potential impact. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory-related vulnerabilities.\n\nAs such, successfully triggering this vulnerability would require a sophisticated attack vector that is capable of accounting for the many native and deployed security mechanisms designed to detect and contain a double-free condition.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-32988"
},
{
"category": "external",
"summary": "RHBZ#2359622",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359622"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-32988",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32988"
}
],
"release_date": "2025-07-10T07:55:14.310000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T19:26:05+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19088"
},
{
"category": "workaround",
"details": "Currently, no mitigation is available for this vulnerability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: Vulnerability in GnuTLS otherName SAN export"
},
{
"cve": "CVE-2025-32989",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2025-04-15T01:21:36.512000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2359621"
}
],
"notes": [
{
"category": "description",
"text": "A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: Vulnerability in GnuTLS SCT extension parsing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-32989"
},
{
"category": "external",
"summary": "RHBZ#2359621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359621"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-32989",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32989"
}
],
"release_date": "2025-07-10T07:54:13.541000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T19:26:05+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19088"
},
{
"category": "workaround",
"details": "Currently, no mitigation is available for this vulnerability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: Vulnerability in GnuTLS SCT extension parsing"
},
{
"cve": "CVE-2025-32990",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2025-04-15T01:21:36.656000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2359620"
}
],
"notes": [
{
"category": "description",
"text": "A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: Vulnerability in GnuTLS certtool template parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a moderate severity because a heap-buffer-overflow (off-by-one) flaw was found exclusively in the certtool utility\u0027s template parsing logic (part of the gnutls-utils package), and does not affect the core gnutls library itself. This issue is triggered when the tool processes specially crafted settings from a template file, leading to an out-of-bounds NULL pointer write. The resulting memory corruption causes a denial-of-service by crashing the application.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-122: Heap-based Buffer Overflow vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with least privilege principles to ensure that only authorized roles and users can execute or manipulate code. Red Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by heap-based buffer overflow exploitations. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions that detect and respond to indicators in real time, preventing or limiting the impact of exploitation attempts. Static code analysis and peer code review techniques ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory buffer overflows and denial-of-service attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-32990"
},
{
"category": "external",
"summary": "RHBZ#2359620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2359620"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-32990",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32990"
}
],
"release_date": "2025-07-09T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T19:26:05+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19088"
},
{
"category": "workaround",
"details": "Currently, no mitigation is available for this vulnerability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: Vulnerability in GnuTLS certtool template parsing"
},
{
"cve": "CVE-2025-53905",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-07-15T21:01:19.770241+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380362"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: Vim path traversial",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation enforces strict path constraints, rejecting directory traversal attempts or unauthorized file access. Runtime environments restrict code execution to predefined privilege levels, preventing escalation from traversal exploits. Configuration settings limit accessible directories and enforce execution boundaries to reduce the influence of user input on file system behavior. Application components are developed and validated against secure coding standards that explicitly prevent path manipulation, further minimizing exploitation risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-53905"
},
{
"category": "external",
"summary": "RHBZ#2380362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380362"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53905"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239",
"url": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr",
"url": "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr"
}
],
"release_date": "2025-07-15T20:48:34.764000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T19:26:05+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19088"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: Vim path traversial"
},
{
"cve": "CVE-2025-53906",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-07-15T21:01:15.057182+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380360"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: Vim path traversal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation enforces strict path constraints, rejecting directory traversal attempts or unauthorized file access. Runtime environments restrict code execution to predefined privilege levels, preventing escalation from traversal exploits. Configuration settings limit accessible directories and enforce execution boundaries to reduce the influence of user input on file system behavior. Application components are developed and validated against secure coding standards that explicitly prevent path manipulation, further minimizing exploitation risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-53906"
},
{
"category": "external",
"summary": "RHBZ#2380360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380360"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53906",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53906"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8",
"url": "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/security/advisories/GHSA-r2fw-9cw4-mj86",
"url": "https://github.com/vim/vim/security/advisories/GHSA-r2fw-9cw4-mj86"
}
],
"release_date": "2025-07-15T20:52:40.137000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T19:26:05+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19088"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:54d0aab9e86766954949e7a5a11fb29b6b1c463ebb5ba0fb46b2d0f108753208_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f4f0ef1497a7cde32f6507f6805050a33ecb95b93bb7ad6bd0544edd3ef19af2_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:435ba9959b793d46a63a74c343bb8c3ff68350496afec12cc5e894dfc40b7648_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:4784c2680572f9d091fcfb8c593d5424c0fcd8ea9cd51d25ddaf2f72abc7da65_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: Vim path traversal"
}
]
}
rhsa-2025:17742
Vulnerability from csaf_redhat
Published
2025-10-13 02:18
Modified
2025-11-06 23:42
Summary
Red Hat Security Advisory: vim security update
Notes
Topic
An update for vim is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Vim path traversal (CVE-2025-53906)
* vim: Vim path traversial (CVE-2025-53905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for vim is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Vim path traversal (CVE-2025-53906)\n\n* vim: Vim path traversial (CVE-2025-53905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:17742",
"url": "https://access.redhat.com/errata/RHSA-2025:17742"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2380360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380360"
},
{
"category": "external",
"summary": "2380362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380362"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_17742.json"
}
],
"title": "Red Hat Security Advisory: vim security update",
"tracking": {
"current_release_date": "2025-11-06T23:42:30+00:00",
"generator": {
"date": "2025-11-06T23:42:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2025:17742",
"initial_release_date": "2025-10-13T02:18:48+00:00",
"revision_history": [
{
"date": "2025-10-13T02:18:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-13T02:18:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:42:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"product": {
"name": "vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"product_id": "vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.2.2637-22.el9_6.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"product": {
"name": "vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"product_id": "vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.2.2637-22.el9_6.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"product": {
"name": "vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"product_id": "vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.2.2637-22.el9_6.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"product": {
"name": "vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"product_id": "vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.2.2637-22.el9_6.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"product": {
"name": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"product_id": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-22.el9_6.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"product": {
"name": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"product_id": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-22.el9_6.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"product": {
"name": "vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"product_id": "vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.2.2637-22.el9_6.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"product": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"product_id": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-22.el9_6.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"product": {
"name": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"product_id": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-22.el9_6.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"product": {
"name": "vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"product_id": "vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.2.2637-22.el9_6.1?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"product": {
"name": "vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"product_id": "vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.2.2637-22.el9_6.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"product": {
"name": "vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"product_id": "vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.2.2637-22.el9_6.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"product": {
"name": "vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"product_id": "vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.2.2637-22.el9_6.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"product": {
"name": "vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"product_id": "vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.2.2637-22.el9_6.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"product": {
"name": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"product_id": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-22.el9_6.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"product": {
"name": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"product_id": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-22.el9_6.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"product": {
"name": "vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"product_id": "vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.2.2637-22.el9_6.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"product": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"product_id": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-22.el9_6.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"product": {
"name": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"product_id": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-22.el9_6.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"product": {
"name": "vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"product_id": "vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.2.2637-22.el9_6.1?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"product": {
"name": "vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"product_id": "vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.2.2637-22.el9_6.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"product": {
"name": "vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"product_id": "vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.2.2637-22.el9_6.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"product": {
"name": "vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"product_id": "vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.2.2637-22.el9_6.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"product": {
"name": "vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"product_id": "vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.2.2637-22.el9_6.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"product": {
"name": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"product_id": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-22.el9_6.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"product": {
"name": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"product_id": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-22.el9_6.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"product": {
"name": "vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"product_id": "vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.2.2637-22.el9_6.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"product": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"product_id": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-22.el9_6.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"product": {
"name": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"product_id": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-22.el9_6.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"product": {
"name": "vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"product_id": "vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.2.2637-22.el9_6.1?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"product": {
"name": "vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"product_id": "vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.2.2637-22.el9_6.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.2.2637-22.el9_6.1.s390x",
"product": {
"name": "vim-common-2:8.2.2637-22.el9_6.1.s390x",
"product_id": "vim-common-2:8.2.2637-22.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.2.2637-22.el9_6.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"product": {
"name": "vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"product_id": "vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.2.2637-22.el9_6.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"product": {
"name": "vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"product_id": "vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.2.2637-22.el9_6.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"product": {
"name": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"product_id": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-22.el9_6.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"product": {
"name": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"product_id": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-22.el9_6.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"product": {
"name": "vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"product_id": "vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.2.2637-22.el9_6.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"product": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"product_id": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-22.el9_6.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"product": {
"name": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"product_id": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-22.el9_6.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"product": {
"name": "vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"product_id": "vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.2.2637-22.el9_6.1?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-2:8.2.2637-22.el9_6.1.src",
"product": {
"name": "vim-2:8.2.2637-22.el9_6.1.src",
"product_id": "vim-2:8.2.2637-22.el9_6.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim@8.2.2637-22.el9_6.1?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"product": {
"name": "vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"product_id": "vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-filesystem@8.2.2637-22.el9_6.1?arch=noarch\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-2:8.2.2637-22.el9_6.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src"
},
"product_reference": "vim-2:8.2.2637-22.el9_6.1.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-common-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:8.2.2637-22.el9_6.1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch"
},
"product_reference": "vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-2:8.2.2637-22.el9_6.1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src"
},
"product_reference": "vim-2:8.2.2637-22.el9_6.1.src",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-common-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:8.2.2637-22.el9_6.1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch"
},
"product_reference": "vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53905",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-07-15T21:01:19.770241+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380362"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: Vim path traversial",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation enforces strict path constraints, rejecting directory traversal attempts or unauthorized file access. Runtime environments restrict code execution to predefined privilege levels, preventing escalation from traversal exploits. Configuration settings limit accessible directories and enforce execution boundaries to reduce the influence of user input on file system behavior. Application components are developed and validated against secure coding standards that explicitly prevent path manipulation, further minimizing exploitation risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-53905"
},
{
"category": "external",
"summary": "RHBZ#2380362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380362"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53905"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239",
"url": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr",
"url": "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr"
}
],
"release_date": "2025-07-15T20:48:34.764000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-13T02:18:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: Vim path traversial"
},
{
"cve": "CVE-2025-53906",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-07-15T21:01:15.057182+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380360"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: Vim path traversal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation enforces strict path constraints, rejecting directory traversal attempts or unauthorized file access. Runtime environments restrict code execution to predefined privilege levels, preventing escalation from traversal exploits. Configuration settings limit accessible directories and enforce execution boundaries to reduce the influence of user input on file system behavior. Application components are developed and validated against secure coding standards that explicitly prevent path manipulation, further minimizing exploitation risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-53906"
},
{
"category": "external",
"summary": "RHBZ#2380360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380360"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53906",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53906"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8",
"url": "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/security/advisories/GHSA-r2fw-9cw4-mj86",
"url": "https://github.com/vim/vim/security/advisories/GHSA-r2fw-9cw4-mj86"
}
],
"release_date": "2025-07-15T20:52:40.137000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-13T02:18:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17742"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-2:8.2.2637-22.el9_6.1.src",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-22.el9_6.1.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-22.el9_6.1.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-22.el9_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: Vim path traversal"
}
]
}
rhsa-2025:17644
Vulnerability from csaf_redhat
Published
2025-10-09 07:19
Modified
2025-11-06 23:42
Summary
Red Hat Security Advisory: vim security update
Notes
Topic
An update for vim is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: Vim path traversal (CVE-2025-53906)
* vim: Vim path traversial (CVE-2025-53905)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for vim is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Vim path traversal (CVE-2025-53906)\n\n* vim: Vim path traversial (CVE-2025-53905)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:17644",
"url": "https://access.redhat.com/errata/RHSA-2025:17644"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2380360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380360"
},
{
"category": "external",
"summary": "2380362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380362"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_17644.json"
}
],
"title": "Red Hat Security Advisory: vim security update",
"tracking": {
"current_release_date": "2025-11-06T23:42:28+00:00",
"generator": {
"date": "2025-11-06T23:42:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2025:17644",
"initial_release_date": "2025-10-09T07:19:29+00:00",
"revision_history": [
{
"date": "2025-10-09T07:19:29+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-09T07:19:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:42:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"product": {
"name": "vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"product_id": "vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.2.2637-20.el9_4.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"product": {
"name": "vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"product_id": "vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.2.2637-20.el9_4.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"product": {
"name": "vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"product_id": "vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.2.2637-20.el9_4.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"product": {
"name": "vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"product_id": "vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.2.2637-20.el9_4.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"product": {
"name": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"product_id": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-20.el9_4.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"product": {
"name": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"product_id": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-20.el9_4.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"product": {
"name": "vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"product_id": "vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.2.2637-20.el9_4.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"product": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"product_id": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-20.el9_4.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"product": {
"name": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"product_id": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-20.el9_4.1?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"product": {
"name": "vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"product_id": "vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_4.1?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"product": {
"name": "vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"product_id": "vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.2.2637-20.el9_4.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"product": {
"name": "vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"product_id": "vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.2.2637-20.el9_4.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"product": {
"name": "vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"product_id": "vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.2.2637-20.el9_4.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"product": {
"name": "vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"product_id": "vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.2.2637-20.el9_4.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"product": {
"name": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"product_id": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-20.el9_4.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"product": {
"name": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"product_id": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-20.el9_4.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"product": {
"name": "vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"product_id": "vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.2.2637-20.el9_4.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"product": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"product_id": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-20.el9_4.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"product": {
"name": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"product_id": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-20.el9_4.1?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"product": {
"name": "vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"product_id": "vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_4.1?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"product": {
"name": "vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"product_id": "vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.2.2637-20.el9_4.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"product": {
"name": "vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"product_id": "vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.2.2637-20.el9_4.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"product": {
"name": "vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"product_id": "vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.2.2637-20.el9_4.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"product": {
"name": "vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"product_id": "vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.2.2637-20.el9_4.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"product": {
"name": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"product_id": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-20.el9_4.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"product": {
"name": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"product_id": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-20.el9_4.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"product": {
"name": "vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"product_id": "vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.2.2637-20.el9_4.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"product": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"product_id": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-20.el9_4.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"product": {
"name": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"product_id": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-20.el9_4.1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"product": {
"name": "vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"product_id": "vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_4.1?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"product": {
"name": "vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"product_id": "vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.2.2637-20.el9_4.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.2.2637-20.el9_4.1.s390x",
"product": {
"name": "vim-common-2:8.2.2637-20.el9_4.1.s390x",
"product_id": "vim-common-2:8.2.2637-20.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.2.2637-20.el9_4.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"product": {
"name": "vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"product_id": "vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.2.2637-20.el9_4.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"product": {
"name": "vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"product_id": "vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.2.2637-20.el9_4.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"product": {
"name": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"product_id": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-20.el9_4.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"product": {
"name": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"product_id": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-20.el9_4.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"product": {
"name": "vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"product_id": "vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.2.2637-20.el9_4.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"product": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"product_id": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-20.el9_4.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"product": {
"name": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"product_id": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-20.el9_4.1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"product": {
"name": "vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"product_id": "vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.2.2637-20.el9_4.1?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-2:8.2.2637-20.el9_4.1.src",
"product": {
"name": "vim-2:8.2.2637-20.el9_4.1.src",
"product_id": "vim-2:8.2.2637-20.el9_4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim@8.2.2637-20.el9_4.1?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"product": {
"name": "vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"product_id": "vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-filesystem@8.2.2637-20.el9_4.1?arch=noarch\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-2:8.2.2637-20.el9_4.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src"
},
"product_reference": "vim-2:8.2.2637-20.el9_4.1.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-common-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:8.2.2637-20.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch"
},
"product_reference": "vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-2:8.2.2637-20.el9_4.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src"
},
"product_reference": "vim-2:8.2.2637-20.el9_4.1.src",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-common-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:8.2.2637-20.el9_4.1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch"
},
"product_reference": "vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53905",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-07-15T21:01:19.770241+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380362"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: Vim path traversial",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation enforces strict path constraints, rejecting directory traversal attempts or unauthorized file access. Runtime environments restrict code execution to predefined privilege levels, preventing escalation from traversal exploits. Configuration settings limit accessible directories and enforce execution boundaries to reduce the influence of user input on file system behavior. Application components are developed and validated against secure coding standards that explicitly prevent path manipulation, further minimizing exploitation risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-53905"
},
{
"category": "external",
"summary": "RHBZ#2380362",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380362"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53905"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239",
"url": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr",
"url": "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr"
}
],
"release_date": "2025-07-15T20:48:34.764000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-09T07:19:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17644"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: Vim path traversial"
},
{
"cve": "CVE-2025-53906",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-07-15T21:01:15.057182+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380360"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal flaw was found in Vim. Successful exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: Vim path traversal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation enforces strict path constraints, rejecting directory traversal attempts or unauthorized file access. Runtime environments restrict code execution to predefined privilege levels, preventing escalation from traversal exploits. Configuration settings limit accessible directories and enforce execution boundaries to reduce the influence of user input on file system behavior. Application components are developed and validated against secure coding standards that explicitly prevent path manipulation, further minimizing exploitation risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-53906"
},
{
"category": "external",
"summary": "RHBZ#2380360",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380360"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-53906",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53906"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8",
"url": "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8"
},
{
"category": "external",
"summary": "https://github.com/vim/vim/security/advisories/GHSA-r2fw-9cw4-mj86",
"url": "https://github.com/vim/vim/security/advisories/GHSA-r2fw-9cw4-mj86"
}
],
"release_date": "2025-07-15T20:52:40.137000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-09T07:19:29+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17644"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-2:8.2.2637-20.el9_4.1.src",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-X11-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-X11-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-common-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-common-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-debugsource-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-enhanced-debuginfo-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-filesystem-2:8.2.2637-20.el9_4.1.noarch",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-minimal-2:8.2.2637-20.el9_4.1.x86_64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.aarch64",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.ppc64le",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.s390x",
"BaseOS-9.4.0.Z.EUS:vim-minimal-debuginfo-2:8.2.2637-20.el9_4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: Vim path traversal"
}
]
}
wid-sec-w-2025-1575
Vulnerability from csaf_certbund
Published
2025-07-15 22:00
Modified
2025-10-23 22:00
Summary
vim (.tar and .zip): Mehrere Schwachstellen ermöglichen Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in vim ausnutzen, um beliebigen Programmcode auszuführen oder um beliebige Dateien zu überschreiben.
Betroffene Betriebssysteme
- Sonstiges
- UNIX
- Windows
{
"document": {
"aggregate_severity": {
"text": "niedrig"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in vim ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder um beliebige Dateien zu \u00fcberschreiben.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1575 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1575.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1575 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1575"
},
{
"category": "external",
"summary": "Red Hat Bugtracker vom 2025-07-15",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380360"
},
{
"category": "external",
"summary": "Red Hat Bugtracker vom 2025-07-15",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380362"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-9395406660 vom 2025-07-16",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-9395406660"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-CC42339EF7 vom 2025-07-16",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-cc42339ef7"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7748-1 vom 2025-09-15",
"url": "https://ubuntu.com/security/notices/USN-7748-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03240-1 vom 2025-09-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022546.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20696-1 vom 2025-09-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022575.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03300-1 vom 2025-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022606.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03299-1 vom 2025-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022607.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17644 vom 2025-10-09",
"url": "https://access.redhat.com/errata/RHSA-2025:17644"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-17715 vom 2025-10-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-17715.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17715 vom 2025-10-10",
"url": "https://access.redhat.com/errata/RHSA-2025:17715"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:17715 vom 2025-10-12",
"url": "https://errata.build.resf.org/RLSA-2025:17715"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17742 vom 2025-10-13",
"url": "https://access.redhat.com/errata/RHSA-2025:17742"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-17742 vom 2025-10-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-17742.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:17913 vom 2025-10-14",
"url": "https://access.redhat.com/errata/RHSA-2025:17913"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-17913 vom 2025-10-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-17913.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:17913 vom 2025-10-18",
"url": "https://errata.build.resf.org/RLSA-2025:17913"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:17742 vom 2025-10-18",
"url": "https://errata.build.resf.org/RLSA-2025:17742"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19088 vom 2025-10-23",
"url": "https://access.redhat.com/errata/RHSA-2025:19088"
}
],
"source_lang": "en-US",
"title": "vim (.tar and .zip): Mehrere Schwachstellen erm\u00f6glichen Codeausf\u00fchrung",
"tracking": {
"current_release_date": "2025-10-23T22:00:00.000+00:00",
"generator": {
"date": "2025-10-24T08:35:12.158+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1575",
"initial_release_date": "2025-07-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-09-15T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-17T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-10-08T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-09T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2025-10-13T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-10-14T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "12"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c9.1.1551",
"product": {
"name": "Open Source vim \u003c9.1.1551",
"product_id": "T045434"
}
},
{
"category": "product_version",
"name": "9.1.1551",
"product": {
"name": "Open Source vim 9.1.1551",
"product_id": "T045434-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:vim:vim:9.1.1551"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.1552",
"product": {
"name": "Open Source vim \u003c9.1.1552",
"product_id": "T045435"
}
},
{
"category": "product_version",
"name": "9.1.1552",
"product": {
"name": "Open Source vim 9.1.1552",
"product_id": "T045435-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:vim:vim:9.1.1552"
}
}
}
],
"category": "product_name",
"name": "vim"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53905",
"product_status": {
"known_affected": [
"T045434",
"T002207",
"67646",
"T000126",
"T004914",
"T032255",
"74185"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-53905"
},
{
"cve": "CVE-2025-53906",
"product_status": {
"known_affected": [
"T045435",
"T045434",
"T002207",
"67646",
"T000126",
"T004914",
"T032255",
"74185"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-53906"
}
]
}
msrc_cve-2025-53905
Vulnerability from csaf_microsoft
Published
2025-07-02 00:00
Modified
2025-08-06 00:00
Summary
Vim has path traversial issue with tar.vim and special crafted tar files
Notes
Additional Resources
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer
The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53905 Vim has path traversial issue with tar.vim and special crafted tar files - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-53905.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Vim has path traversial issue with tar.vim and special crafted tar files",
"tracking": {
"current_release_date": "2025-08-06T00:00:00.000Z",
"generator": {
"date": "2025-10-20T03:36:12.202Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-53905",
"initial_release_date": "2025-07-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-08-06T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 vim 9.1.1552-1",
"product": {
"name": "\u003ccbl2 vim 9.1.1552-1",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "cbl2 vim 9.1.1552-1",
"product": {
"name": "cbl2 vim 9.1.1552-1",
"product_id": "19576"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 vim 9.1.1552-1",
"product": {
"name": "\u003cazl3 vim 9.1.1552-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 vim 9.1.1552-1",
"product": {
"name": "azl3 vim 9.1.1552-1",
"product_id": "19624"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 vim 9.1.1198-1",
"product": {
"name": "\u003cazl3 vim 9.1.1198-1",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "azl3 vim 9.1.1198-1",
"product": {
"name": "azl3 vim 9.1.1198-1",
"product_id": "19409"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 vim 9.1.1198-1",
"product": {
"name": "\u003ccbl2 vim 9.1.1198-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 vim 9.1.1198-1",
"product": {
"name": "cbl2 vim 9.1.1198-1",
"product_id": "20302"
}
}
],
"category": "product_name",
"name": "vim"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 vim 9.1.1552-1 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 vim 9.1.1552-1 as a component of CBL Mariner 2.0",
"product_id": "19576-17086"
},
"product_reference": "19576",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 vim 9.1.1552-1 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 vim 9.1.1552-1 as a component of Azure Linux 3.0",
"product_id": "19624-17084"
},
"product_reference": "19624",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 vim 9.1.1198-1 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 vim 9.1.1198-1 as a component of Azure Linux 3.0",
"product_id": "19409-17084"
},
"product_reference": "19409",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 vim 9.1.1198-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 vim 9.1.1198-1 as a component of CBL Mariner 2.0",
"product_id": "20302-17086"
},
"product_reference": "20302",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-53905",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0026#39;Path Traversal\u0026#39;)"
},
"notes": [
{
"category": "general",
"text": "GitHub_M",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19576-17086",
"19624-17084",
"19409-17084",
"20302-17086"
],
"known_affected": [
"17086-3",
"17084-2",
"17084-4",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53905 Vim has path traversial issue with tar.vim and special crafted tar files - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-53905.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-06T00:00:00.000Z",
"details": "9.1.1552-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-3",
"17084-2",
"17084-4",
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"temporalScore": 4.1,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"17086-3",
"17084-2",
"17084-4",
"17086-1"
]
}
],
"title": "Vim has path traversial issue with tar.vim and special crafted tar files"
}
]
}
CERTFR-2025-AVI-0693
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
References
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Valkey versions 8.1.x ant\u00e9rieures \u00e0 8.1.3",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions 8.0.x ant\u00e9rieures \u00e0 8.0.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions ant\u00e9rieures \u00e0 3.0.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions 7.2.x ant\u00e9rieures \u00e0 7.2.10",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2021-4136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4136"
},
{
"name": "CVE-2021-4173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4173"
},
{
"name": "CVE-2021-4187",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4187"
},
{
"name": "CVE-2021-4166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4166"
},
{
"name": "CVE-2021-3968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3968"
},
{
"name": "CVE-2021-3927",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3927"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2021-3928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3928"
},
{
"name": "CVE-2021-3974",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3974"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2042"
},
{
"name": "CVE-2022-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2126"
},
{
"name": "CVE-2022-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1620"
},
{
"name": "CVE-2022-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1619"
},
{
"name": "CVE-2022-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1720"
},
{
"name": "CVE-2022-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2124"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2022-1616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1616"
},
{
"name": "CVE-2022-2125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2125"
},
{
"name": "CVE-2022-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3705"
},
{
"name": "CVE-2023-0049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0049"
},
{
"name": "CVE-2023-0051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0051"
},
{
"name": "CVE-2023-0054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0054"
},
{
"name": "CVE-2023-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0433"
},
{
"name": "CVE-2023-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0288"
},
{
"name": "CVE-2023-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0512"
},
{
"name": "CVE-2022-3099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3099"
},
{
"name": "CVE-2022-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38533"
},
{
"name": "CVE-2022-3324",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3324"
},
{
"name": "CVE-2022-2345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2345"
},
{
"name": "CVE-2022-3256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3256"
},
{
"name": "CVE-2023-4734",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4734"
},
{
"name": "CVE-2023-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4781"
},
{
"name": "CVE-2023-4735",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4735"
},
{
"name": "CVE-2023-4752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4752"
},
{
"name": "CVE-2023-4751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4751"
},
{
"name": "CVE-2023-4738",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4738"
},
{
"name": "CVE-2023-5344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5344"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2024-22667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22667"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2022-47007",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47007"
},
{
"name": "CVE-2022-47008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47008"
},
{
"name": "CVE-2022-47010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47010"
},
{
"name": "CVE-2022-47011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47011"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2023-1579",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1579"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2023-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1972"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2021-3973",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3973"
},
{
"name": "CVE-2022-2129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2129"
},
{
"name": "CVE-2022-2175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2175"
},
{
"name": "CVE-2022-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2182"
},
{
"name": "CVE-2022-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2183"
},
{
"name": "CVE-2022-2206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2206"
},
{
"name": "CVE-2022-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2207"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2022-2210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2210"
},
{
"name": "CVE-2022-2257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2257"
},
{
"name": "CVE-2022-2284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2284"
},
{
"name": "CVE-2022-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2285"
},
{
"name": "CVE-2022-2286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2286"
},
{
"name": "CVE-2022-2287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2287"
},
{
"name": "CVE-2022-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2304"
},
{
"name": "CVE-2022-2343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2343"
},
{
"name": "CVE-2022-2344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2344"
},
{
"name": "CVE-2022-2522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2522"
},
{
"name": "CVE-2022-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2817"
},
{
"name": "CVE-2022-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2819"
},
{
"name": "CVE-2022-2845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2845"
},
{
"name": "CVE-2022-2849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2849"
},
{
"name": "CVE-2022-2862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2862"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2022-2889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2889"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2022-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2946"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2022-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2982"
},
{
"name": "CVE-2022-3016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3016"
},
{
"name": "CVE-2022-3037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3037"
},
{
"name": "CVE-2022-3134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3134"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-3234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3234"
},
{
"name": "CVE-2022-3235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3235"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-3296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3296"
},
{
"name": "CVE-2022-3297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3297"
},
{
"name": "CVE-2022-3352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3352"
},
{
"name": "CVE-2022-4141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4141"
},
{
"name": "CVE-2022-4292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4292"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2023-1127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1127"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2023-2610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2610"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2023-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5535"
},
{
"name": "CVE-2024-29040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29040"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2024-45306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45306"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-20197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20197"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2023-2222",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2222"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-57360",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57360"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2025-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1153"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-3198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3198"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5245"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-7545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7545"
},
{
"name": "CVE-2025-7546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7546"
}
],
"initial_release_date": "2025-08-14T00:00:00",
"last_revision_date": "2025-08-14T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0693",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36036",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36036"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36035",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36035"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36038",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36038"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36037",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36037"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
References
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
fkie_cve-2025-53905
Vulnerability from fkie_nvd
Published
2025-07-15 21:15
Modified
2025-11-04 22:16
Severity ?
Summary
Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim’s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.
References
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239 | Patch | |
| security-advisories@github.com | https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr | Exploit, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/07/15/1 | ||
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr | Exploit, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB04D6F6-A934-4796-B934-1684202DD6E7",
"versionEndExcluding": "9.1.1552",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim\u2019s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability."
},
{
"lang": "es",
"value": "Vim es un editor de texto de l\u00ednea de comandos de c\u00f3digo abierto. Antes de la versi\u00f3n 9.1.1552, un problema de path traversal en el complemento tar.vim de Vim permit\u00eda sobrescribir archivos arbitrarios al abrir archivos tar especialmente manipulados. El impacto es bajo, ya que esta vulnerabilidad requiere la interacci\u00f3n directa del usuario. Sin embargo, una explotaci\u00f3n exitosa puede provocar la sobrescritura de archivos confidenciales o la colocaci\u00f3n de c\u00f3digo ejecutable en ubicaciones privilegiadas, seg\u00fan los permisos del proceso que edita el archivo. La v\u00edctima debe editar dicho archivo con Vim, lo que revelar\u00e1 el nombre y el contenido del archivo; un usuario cuidadoso podr\u00eda sospechar que est\u00e1n ocurriendo cosas extra\u00f1as. Una explotaci\u00f3n exitosa podr\u00eda permitir la ejecuci\u00f3n de comandos arbitrarios en el sistema operativo subyacente. La versi\u00f3n 9.1.1552 contiene un parche para esta vulnerabilidad."
}
],
"id": "CVE-2025-53905",
"lastModified": "2025-11-04T22:16:27.173",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 2.7,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-07-15T21:15:34.347",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/07/15/1"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…