Bug 1217316 (CVE-2023-48231) - VUL-0: CVE-2023-48231: vim: Use-After-Free in win_close()
Summary: VUL-0: CVE-2023-48231: vim: Use-After-Free in win_close()
Status: RESOLVED FIXED
Alias: CVE-2023-48231
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/385499/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-48231:3.9:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-11-20 08:37 UTC by SMASH SMASH
Modified: 2024-04-15 16:30 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-11-20 08:37:13 UTC
When closing a window, vim may try to access already freed window structure. So before trying to access any window related variable verify that the window to be closed is still valid and if not, return.

Impact is low, since it is not very easy to make use of this and execute some payload (in particular not, without the user noticing).

The Vim project would like to thank Fabian Toepfer for reporting this issue which is now fixed in Vim patch 9.0.2106.

References:
https://github.com/vim/vim/security/advisories/GHSA-8g46-v9ff-c765
Comment 1 Gabriele Sonnu 2023-11-20 08:38:15 UTC
Tracking all SLE codestreams plus Factory as affected.

Upstream patch:

https://github.com/vim/vim/commit/25aabc2b8ee1e19ced6f4da9d866cf9378fc4c5a
Comment 5 Zoltan Balogh 2024-02-29 10:53:44 UTC
Upcoming maintenance update will contain this fix.
Comment 11 Maintenance Automation 2024-03-06 20:30:08 UTC
SUSE-SU-2024:0783-1: An update that solves 10 vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215005, 1217316, 1217320, 1217321, 1217324, 1217326, 1217329, 1217330, 1217432, 1219581
CVE References: CVE-2023-4750, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2024-22667
Sources used:
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): vim-9.1.0111-17.29.1
SUSE Linux Enterprise Server 12 SP5 (src): vim-9.1.0111-17.29.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): vim-9.1.0111-17.29.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Maintenance Automation 2024-03-13 16:30:16 UTC
SUSE-SU-2024:0871-1: An update that solves 10 vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215005, 1217316, 1217320, 1217321, 1217324, 1217326, 1217329, 1217330, 1217432, 1219581
CVE References: CVE-2023-4750, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2024-22667
Sources used:
openSUSE Leap Micro 5.3 (src): vim-9.1.0111-150000.5.60.1
openSUSE Leap Micro 5.4 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise Micro for Rancher 5.3 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise Micro 5.3 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise Micro 5.4 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src): vim-9.1.0111-150000.5.60.1
SUSE Manager Proxy 4.3 (src): vim-9.1.0111-150000.5.60.1
SUSE Manager Retail Branch Server 4.3 (src): vim-9.1.0111-150000.5.60.1
SUSE Manager Server 4.3 (src): vim-9.1.0111-150000.5.60.1
SUSE Enterprise Storage 7.1 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise Micro 5.1 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise Micro 5.2 (src): vim-9.1.0111-150000.5.60.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): vim-9.1.0111-150000.5.60.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 14 Maintenance Automation 2024-04-15 16:30:08 UTC
SUSE-SU-2024:1287-1: An update that solves 10 vulnerabilities can now be installed.

Category: security (important)
Bug References: 1215005, 1217316, 1217320, 1217321, 1217324, 1217326, 1217329, 1217330, 1217432, 1219581
CVE References: CVE-2023-4750, CVE-2023-48231, CVE-2023-48232, CVE-2023-48233, CVE-2023-48234, CVE-2023-48235, CVE-2023-48236, CVE-2023-48237, CVE-2023-48706, CVE-2024-22667
Maintenance Incident: [SUSE:Maintenance:32818](https://smelt.suse.de/incident/32818/)
Sources used:
openSUSE Leap 15.5 (src):
 vim-9.1.0111-150500.20.9.1
SUSE Linux Enterprise Micro 5.5 (src):
 vim-9.1.0111-150500.20.9.1
Basesystem Module 15-SP5 (src):
 vim-9.1.0111-150500.20.9.1
Desktop Applications Module 15-SP5 (src):
 vim-9.1.0111-150500.20.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.