Bugzilla – Bug 1217316
VUL-0: CVE-2023-48231: vim: Use-After-Free in win_close()
Last modified: 2024-04-15 16:30:08 UTC
When closing a window, vim may try to access already freed window structure. So before trying to access any window related variable verify that the window to be closed is still valid and if not, return. Impact is low, since it is not very easy to make use of this and execute some payload (in particular not, without the user noticing). The Vim project would like to thank Fabian Toepfer for reporting this issue which is now fixed in Vim patch 9.0.2106. References: https://github.com/vim/vim/security/advisories/GHSA-8g46-v9ff-c765
Tracking all SLE codestreams plus Factory as affected. Upstream patch: https://github.com/vim/vim/commit/25aabc2b8ee1e19ced6f4da9d866cf9378fc4c5a
Upcoming maintenance update will contain this fix.
SUSE-SU-2024:0783-1: An update that solves 10 vulnerabilities can now be installed. Category: security (important) Bug References: 1215005, 1217316, 1217320, 1217321, 1217324, 1217326, 1217329, 1217330, 1217432, 1219581 CVE References: CVE-2023-4750, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2024-22667 Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): vim-9.1.0111-17.29.1 SUSE Linux Enterprise Server 12 SP5 (src): vim-9.1.0111-17.29.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): vim-9.1.0111-17.29.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:0871-1: An update that solves 10 vulnerabilities can now be installed. Category: security (important) Bug References: 1215005, 1217316, 1217320, 1217321, 1217324, 1217326, 1217329, 1217330, 1217432, 1219581 CVE References: CVE-2023-4750, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2024-22667 Sources used: openSUSE Leap Micro 5.3 (src): vim-9.1.0111-150000.5.60.1 openSUSE Leap Micro 5.4 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Micro for Rancher 5.3 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Micro 5.3 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Micro 5.4 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): vim-9.1.0111-150000.5.60.1 SUSE Manager Proxy 4.3 (src): vim-9.1.0111-150000.5.60.1 SUSE Manager Retail Branch Server 4.3 (src): vim-9.1.0111-150000.5.60.1 SUSE Manager Server 4.3 (src): vim-9.1.0111-150000.5.60.1 SUSE Enterprise Storage 7.1 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Micro 5.1 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Micro 5.2 (src): vim-9.1.0111-150000.5.60.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): vim-9.1.0111-150000.5.60.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:1287-1: An update that solves 10 vulnerabilities can now be installed. Category: security (important) Bug References: 1215005, 1217316, 1217320, 1217321, 1217324, 1217326, 1217329, 1217330, 1217432, 1219581 CVE References: CVE-2023-4750, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2024-22667 Maintenance Incident: [SUSE:Maintenance:32818](https://smelt.suse.de/incident/32818/) Sources used: openSUSE Leap 15.5 (src): vim-9.1.0111-150500.20.9.1 SUSE Linux Enterprise Micro 5.5 (src): vim-9.1.0111-150500.20.9.1 Basesystem Module 15-SP5 (src): vim-9.1.0111-150500.20.9.1 Desktop Applications Module 15-SP5 (src): vim-9.1.0111-150500.20.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.