Bugzilla – Bug 1215005
VUL-0: CVE-2023-4750: vim: Heap use-after-free in function bt_quickfix
Last modified: 2024-04-15 16:30:08 UTC
CVE-2023-4750 Use After Free in GitHub repository vim/vim prior to 9.0.1857. Upstream commit: https://github.com/vim/vim/commit/fc68299d436cf87453e432daa77b6d545df4d7ed References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4750 https://bugzilla.redhat.com/show_bug.cgi?id=2237314 https://www.cve.org/CVERecord?id=CVE-2023-4750 https://huntr.dev/bounties/1ab3ebdf-fe7d-4436-b483-9a586e03b0ea
I will do a submit request this week (today).
I must have made a mistake when edited the changelog for the update on Wed Sep 20 05:27:36 UTC 2023 The fix for this bug was in the patch 9.0.1857 On Sep 20 I have pushed the update with version 9.0 with patch level 1894 and on Wed Nov 22 12:25:04 UTC 2023 to version 9.0 with patch level 2103. What I can do is add this missing line to the next update.
SUSE-SU-2024:0783-1: An update that solves 10 vulnerabilities can now be installed. Category: security (important) Bug References: 1215005, 1217316, 1217320, 1217321, 1217324, 1217326, 1217329, 1217330, 1217432, 1219581 CVE References: CVE-2023-4750, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2024-22667 Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): vim-9.1.0111-17.29.1 SUSE Linux Enterprise Server 12 SP5 (src): vim-9.1.0111-17.29.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): vim-9.1.0111-17.29.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:0871-1: An update that solves 10 vulnerabilities can now be installed. Category: security (important) Bug References: 1215005, 1217316, 1217320, 1217321, 1217324, 1217326, 1217329, 1217330, 1217432, 1219581 CVE References: CVE-2023-4750, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2024-22667 Sources used: openSUSE Leap Micro 5.3 (src): vim-9.1.0111-150000.5.60.1 openSUSE Leap Micro 5.4 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Micro 5.3 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Micro 5.4 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): vim-9.1.0111-150000.5.60.1 SUSE Manager Proxy 4.3 (src): vim-9.1.0111-150000.5.60.1 SUSE Manager Retail Branch Server 4.3 (src): vim-9.1.0111-150000.5.60.1 SUSE Manager Server 4.3 (src): vim-9.1.0111-150000.5.60.1 SUSE Enterprise Storage 7.1 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Micro 5.1 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Micro 5.2 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): vim-9.1.0111-150000.5.60.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:1287-1: An update that solves 10 vulnerabilities can now be installed. Category: security (important) Bug References: 1215005, 1217316, 1217320, 1217321, 1217324, 1217326, 1217329, 1217330, 1217432, 1219581 CVE References: CVE-2023-4750, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2024-22667 Maintenance Incident: [SUSE:Maintenance:32818](https://smelt.suse.de/incident/32818/) Sources used: openSUSE Leap 15.5 (src): vim-9.1.0111-150500.20.9.1 SUSE Linux Enterprise Micro 5.5 (src): vim-9.1.0111-150500.20.9.1 Basesystem Module 15-SP5 (src): vim-9.1.0111-150500.20.9.1 Desktop Applications Module 15-SP5 (src): vim-9.1.0111-150500.20.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.