Bugzilla – Bug 1195004
VUL-0: CVE-2022-0318: vim: Heap-based Buffer Overflow in vim prior to 8.2.
Last modified: 2022-06-16 19:23:46 UTC
CVE-2022-0318 Heap-based Buffer Overflow in Conda vim prior to 8.2. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0318 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318 https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08
Affected: - SUSE:SLE-15:Update - openSUSE:Factory
The poc reproduces the failure and the upstream patch fixes the problem but it causes the Test_visual_block_insert fail (Expected ['axaa', 'xあああ', 'bxbb'] but got ['axaa', ' x ああ', 'bxbb']) This issue could be fixed by updating to 8.2
SUSE-SU-2022:0736-1: An update that fixes 14 vulnerabilities is now available. Category: security (important) Bug References: 1190533,1190570,1191893,1192478,1192481,1193294,1193298,1194216,1194556,1195004,1195066,1195126,1195202,1195356 CVE References: CVE-2021-3778,CVE-2021-3796,CVE-2021-3872,CVE-2021-3927,CVE-2021-3928,CVE-2021-3984,CVE-2021-4019,CVE-2021-4193,CVE-2021-46059,CVE-2022-0318,CVE-2022-0319,CVE-2022-0351,CVE-2022-0361,CVE-2022-0413 JIRA References: Sources used: SUSE Manager Server 4.1 (src): vim-8.0.1568-5.17.1 SUSE Manager Retail Branch Server 4.1 (src): vim-8.0.1568-5.17.1 SUSE Manager Proxy 4.1 (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise Server for SAP 15 (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise Server 15-LTSS (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise Realtime Extension 15-SP2 (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise Module for Basesystem 15-SP4 (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise Micro 5.1 (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise Micro 5.0 (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): vim-8.0.1568-5.17.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): vim-8.0.1568-5.17.1 SUSE Enterprise Storage 7 (src): vim-8.0.1568-5.17.1 SUSE Enterprise Storage 6 (src): vim-8.0.1568-5.17.1 SUSE CaaS Platform 4.0 (src): vim-8.0.1568-5.17.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2022:0736-1: An update that fixes 14 vulnerabilities is now available. Category: security (important) Bug References: 1190533,1190570,1191893,1192478,1192481,1193294,1193298,1194216,1194556,1195004,1195066,1195126,1195202,1195356 CVE References: CVE-2021-3778,CVE-2021-3796,CVE-2021-3872,CVE-2021-3927,CVE-2021-3928,CVE-2021-3984,CVE-2021-4019,CVE-2021-4193,CVE-2021-46059,CVE-2022-0318,CVE-2022-0319,CVE-2022-0351,CVE-2022-0361,CVE-2022-0413 JIRA References: Sources used: openSUSE Leap 15.4 (src): vim-8.0.1568-5.17.1 openSUSE Leap 15.3 (src): vim-8.0.1568-5.17.1
SUSE-SU-2022:0736-2: An update that fixes 14 vulnerabilities is now available. Category: security (important) Bug References: 1190533,1190570,1191893,1192478,1192481,1193294,1193298,1194216,1194556,1195004,1195066,1195126,1195202,1195356 CVE References: CVE-2021-3778,CVE-2021-3796,CVE-2021-3872,CVE-2021-3927,CVE-2021-3928,CVE-2021-3984,CVE-2021-4019,CVE-2021-4193,CVE-2021-46059,CVE-2022-0318,CVE-2022-0319,CVE-2022-0351,CVE-2022-0361,CVE-2022-0413 JIRA References: Sources used: SUSE Linux Enterprise Micro 5.2 (src): vim-8.0.1568-5.17.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2022:2102-1: An update that fixes 45 vulnerabilities is now available. Category: security (important) Bug References: 1070955,1191770,1192167,1192902,1192903,1192904,1193466,1193905,1194093,1194216,1194217,1194388,1194872,1194885,1195004,1195203,1195332,1195354,1196361,1198596,1198748,1199331,1199333,1199334,1199651,1199655,1199693,1199745,1199747,1199936,1200010,1200011,1200012 CVE References: CVE-2017-17087,CVE-2021-3778,CVE-2021-3796,CVE-2021-3872,CVE-2021-3875,CVE-2021-3903,CVE-2021-3927,CVE-2021-3928,CVE-2021-3968,CVE-2021-3973,CVE-2021-3974,CVE-2021-3984,CVE-2021-4019,CVE-2021-4069,CVE-2021-4136,CVE-2021-4166,CVE-2021-4192,CVE-2021-4193,CVE-2021-46059,CVE-2022-0128,CVE-2022-0213,CVE-2022-0261,CVE-2022-0318,CVE-2022-0319,CVE-2022-0351,CVE-2022-0359,CVE-2022-0361,CVE-2022-0392,CVE-2022-0407,CVE-2022-0413,CVE-2022-0696,CVE-2022-1381,CVE-2022-1420,CVE-2022-1616,CVE-2022-1619,CVE-2022-1620,CVE-2022-1733,CVE-2022-1735,CVE-2022-1771,CVE-2022-1785,CVE-2022-1796,CVE-2022-1851,CVE-2022-1897,CVE-2022-1898,CVE-2022-1927 JIRA References: Sources used: openSUSE Leap 15.4 (src): vim-8.2.5038-150000.5.21.1 openSUSE Leap 15.3 (src): vim-8.2.5038-150000.5.21.1 SUSE Manager Server 4.1 (src): vim-8.2.5038-150000.5.21.1 SUSE Manager Retail Branch Server 4.1 (src): vim-8.2.5038-150000.5.21.1 SUSE Manager Proxy 4.1 (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise Server for SAP 15-SP2 (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise Server for SAP 15 (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise Server 15-SP2-LTSS (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise Server 15-SP2-BCL (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise Server 15-LTSS (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise Module for Basesystem 15-SP4 (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise Micro 5.2 (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise Micro 5.1 (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): vim-8.2.5038-150000.5.21.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): vim-8.2.5038-150000.5.21.1 SUSE Enterprise Storage 7 (src): vim-8.2.5038-150000.5.21.1 SUSE Enterprise Storage 6 (src): vim-8.2.5038-150000.5.21.1 SUSE CaaS Platform 4.0 (src): vim-8.2.5038-150000.5.21.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.