Bugzilla – Bug 1206028
VUL-0: CVE-2022-3491: vim: Heap-based Buffer Overflow prior to 9.0.0742
Last modified: 2023-01-31 05:30:17 UTC
rh#2150770 Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0742. References: https://bugzilla.redhat.com/show_bug.cgi?id=2150770 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3491 https://www.cve.org/CVERecord?id=CVE-2022-3491 https://github.com/vim/vim/commit/3558afe9e9e904cabb8475392d859f2d2fc21041 http://www.cvedetails.com/cve/CVE-2022-3491/ https://huntr.dev/bounties/6e6e05c2-2cf7-4aa5-a817-a62007bf92cb
SUSE-SU-2022:4631-1: An update that fixes 7 vulnerabilities is now available. Category: security (important) Bug References: 1204779,1205797,1206028,1206071,1206072,1206075,1206077 CVE References: CVE-2022-3491,CVE-2022-3520,CVE-2022-3591,CVE-2022-3705,CVE-2022-4141,CVE-2022-4292,CVE-2022-4293 JIRA References: Sources used: openSUSE Leap Micro 5.3 (src): vim-9.0.1040-150000.5.31.1 openSUSE Leap Micro 5.2 (src): vim-9.0.1040-150000.5.31.1 openSUSE Leap 15.4 (src): vim-9.0.1040-150000.5.31.1 openSUSE Leap 15.3 (src): vim-9.0.1040-150000.5.31.1 SUSE Manager Server 4.2 (src): vim-9.0.1040-150000.5.31.1 SUSE Manager Server 4.1 (src): vim-9.0.1040-150000.5.31.1 SUSE Manager Retail Branch Server 4.2 (src): vim-9.0.1040-150000.5.31.1 SUSE Manager Retail Branch Server 4.1 (src): vim-9.0.1040-150000.5.31.1 SUSE Manager Proxy 4.2 (src): vim-9.0.1040-150000.5.31.1 SUSE Manager Proxy 4.1 (src): vim-9.0.1040-150000.5.31.1 SUSE Linux Enterprise Server for SAP 15-SP3 (src): vim-9.0.1040-150000.5.31.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): vim-9.0.1040-150000.5.31.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): vim-9.0.1040-150000.5.31.1 SUSE Linux Enterprise Server 15-SP3-LTSS (src): vim-9.0.1040-150000.5.31.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): vim-9.0.1040-150000.5.31.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): vim-9.0.1040-150000.5.31.1 SUSE Linux Enterprise Realtime Extension 15-SP3 (src): vim-9.0.1040-150000.5.31.1 SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (src): vim-9.0.1040-150000.5.31.1 SUSE Linux Enterprise Module for Basesystem 15-SP4 (src): vim-9.0.1040-150000.5.31.1 SUSE Linux Enterprise Micro 5.3 (src): vim-9.0.1040-150000.5.31.1 SUSE Linux Enterprise Micro 5.2 (src): vim-9.0.1040-150000.5.31.1 SUSE Linux Enterprise Micro 5.1 (src): vim-9.0.1040-150000.5.31.1 SUSE Linux Enterprise High Performance Computing 15-SP3-LTSS (src): vim-9.0.1040-150000.5.31.1 SUSE Linux Enterprise High Performance Computing 15-SP3-ESPOS (src): vim-9.0.1040-150000.5.31.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): vim-9.0.1040-150000.5.31.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): vim-9.0.1040-150000.5.31.1 SUSE Enterprise Storage 7.1 (src): vim-9.0.1040-150000.5.31.1 SUSE Enterprise Storage 7 (src): vim-9.0.1040-150000.5.31.1 SUSE Enterprise Storage 6 (src): vim-9.0.1040-150000.5.31.1 SUSE CaaS Platform 4.0 (src): vim-9.0.1040-150000.5.31.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:0209-1: An update that fixes 12 vulnerabilities is now available. Category: security (important) Bug References: 1204779,1205797,1206028,1206071,1206072,1206075,1206077,1206866,1206867,1206868,1207162,1207396 CVE References: CVE-2022-3491,CVE-2022-3520,CVE-2022-3591,CVE-2022-3705,CVE-2022-4141,CVE-2022-4292,CVE-2022-4293,CVE-2023-0049,CVE-2023-0051,CVE-2023-0054,CVE-2023-0288,CVE-2023-0433 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): vim-9.0.1234-17.12.1 SUSE OpenStack Cloud 9 (src): vim-9.0.1234-17.12.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): vim-9.0.1234-17.12.1 SUSE Linux Enterprise Server 12-SP5 (src): vim-9.0.1234-17.12.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): vim-9.0.1234-17.12.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): vim-9.0.1234-17.12.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.