Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP2:Update
patchinfo.25688
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.25688
<patchinfo incident="25688"> <issue tracker="bnc" id="1201132">VUL-1: CVE-2022-2264: vim: out of bounds read in inc()</issue> <issue tracker="bnc" id="1200698">VUL-1: CVE-2022-2125: vim: out of bounds read in get_lisp_indent()</issue> <issue tracker="bnc" id="1200700">VUL-1: CVE-2022-2126: vim: out of bounds read in suggest_trie_walk()</issue> <issue tracker="bnc" id="1201152">VUL-1: CVE-2022-2208: vim: null pointer dereference in diff_check()</issue> <issue tracker="bnc" id="1200884">Vim: Error on startup</issue> <issue tracker="bnc" id="1202046">VUL-1: CVE-2022-2571: vim: Heap-based Buffer Overflow related to ins_comp_get_next_word_or_line()</issue> <issue tracker="bnc" id="1202512">VUL-1: CVE-2022-2849: vim: Invalid memory access related to mb_ptr2len()</issue> <issue tracker="bnc" id="1201620">SLE-15-SP4-Full-x86_64-GM-Media1 and vim-plugin-tlib-1.27-bp154.2.18.noarch issue</issue> <issue tracker="bnc" id="1202050">VUL-1: CVE-2022-2581: vim: Out-of-bounds Read related to cstrchr()</issue> <issue tracker="bnc" id="1202689">VUL-1: CVE-2022-2946: vim: use after free in function vim_vsnprintf_typval</issue> <issue tracker="bnc" id="1201363">VUL-1: CVE-2022-2345: vim: Use After Free in GitHub repository vim prior to 9.0.0046.</issue> <issue tracker="bnc" id="1202414">VUL-1: CVE-2022-2819: vim: Heap-based Buffer Overflow in compile_lock_unlock()</issue> <issue tracker="bnc" id="1202049">VUL-1: CVE-2022-2580: vim: Heap-based Buffer Overflow related to eval_string()</issue> <issue tracker="bnc" id="1202421">VUL-1: CVE-2022-2816: vim: Out-of-bounds Read in check_vim9_unlet()</issue> <issue tracker="bnc" id="1202420">VUL-1: CVE-2022-2817: vim: Use After Free in f_assert_fails()</issue> <issue tracker="bnc" id="1201151">VUL-1: CVE-2022-2210: vim: out of bounds read in ml_append_int()</issue> <issue tracker="bnc" id="1201249">VUL-0: CVE-2022-2304: vim: stack buffer overflow in spell_dump_compl()</issue> <issue tracker="bnc" id="1200732">VUL-1: CVE-2022-1720: vim: out of bounds read in grab_file_name()</issue> <issue tracker="bnc" id="1201134">VUL-1: CVE-2022-2285: vim: negative size passed to memmove() due to integer overflow</issue> <issue tracker="bnc" id="1201135">VUL-1: CVE-2022-2286: vim: out of bounds read in ins_bytes()</issue> <issue tracker="bnc" id="1202511">VUL-1: CVE-2022-2862: vim: use-after-free in compile_nested_function()</issue> <issue tracker="bnc" id="1202687">VUL-1: CVE-2022-2923: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240</issue> <issue tracker="bnc" id="1202515">VUL-1: CVE-2022-2845: vim: Buffer Over-read related to display_dollar()</issue> <issue tracker="bnc" id="1201356">VUL-1: CVE-2022-2343: vim: Heap-based Buffer Overflow in GitHub repository vim prior to 9.0.0044</issue> <issue tracker="bnc" id="1202552">VUL-1: CVE-2022-2874: vim: NULL Pointer Dereference in generate_loadvar()</issue> <issue tracker="bnc" id="1201136">VUL-1: CVE-2022-2287: vim: out of bounds read in suggest_trie_walk()</issue> <issue tracker="bnc" id="1200701">VUL-1: CVE-2022-2129: vim: out of bounds write in vim_regsub_both()</issue> <issue tracker="bnc" id="1202599">VUL-1: CVE-2022-2889: vim: use-after-free in find_var_also_in_script() in evalvars.c</issue> <issue tracker="bnc" id="1201863">VUL-1: CVE-2022-2522: vim: out of bounds read via nested autocommand</issue> <issue tracker="bnc" id="1201153">VUL-1: CVE-2022-2207: vim: out of bounds read in ins_bs()</issue> <issue tracker="bnc" id="1201150">VUL-1: CVE-2022-2231: vim: null pointer dereference skipwhite()</issue> <issue tracker="bnc" id="1200697">VUL-1: CVE-2022-2124: vim: out of bounds read in current_quote()</issue> <issue tracker="bnc" id="1201133">VUL-1: CVE-2022-2284: vim: out of bounds read in utfc_ptr2len()</issue> <issue tracker="bnc" id="1200904">VUL-0: CVE-2022-2175: vim: Buffer Over-read through cmdline_insert_reg()</issue> <issue tracker="bnc" id="1201155">VUL-1: CVE-2022-2206: vim: out of bounds read in msg_outtrans_attr()</issue> <issue tracker="bnc" id="1200270">VUL-1: CVE-2022-1968: vim: use after free in utf_ptr2char</issue> <issue tracker="bnc" id="1201154">VUL-1: CVE-2022-2257: vim: out of bounds read in msg_outtrans_special()</issue> <issue tracker="bnc" id="1202051">VUL-1: CVE-2022-2598: vim: Undefined Behavior for Input to API related to diff_mark_adjust_tp() and ex_diffgetput()</issue> <issue tracker="bnc" id="1202862">VUL-1: CVE-2022-3016: vim: Use After Free in vim prior to 9.0.0285</issue> <issue tracker="bnc" id="1200903">VUL-0: CVE-2022-2182: vim: Heap-based Buffer Overflow through parse_cmd_address()</issue> <issue tracker="bnc" id="1201359">VUL-1: CVE-2022-2344: vim: Another Heap-based Buffer Overflow vim prior to 9.0.0045</issue> <issue tracker="bnc" id="1200902">VUL-0: CVE-2022-2183: vim: Out-of-bounds Read through get_lisp_indent()</issue> <issue tracker="cve" id="2022-1968"/> <issue tracker="cve" id="2022-2286"/> <issue tracker="cve" id="2022-2598"/> <issue tracker="cve" id="2022-2581"/> <issue tracker="cve" id="2022-2345"/> <issue tracker="cve" id="2022-2129"/> <issue tracker="cve" id="2022-2816"/> <issue tracker="cve" id="2022-1720"/> <issue tracker="cve" id="2022-2231"/> <issue tracker="cve" id="2022-2207"/> <issue tracker="cve" id="2022-2126"/> <issue tracker="cve" id="2022-2285"/> <issue tracker="cve" id="2022-2344"/> <issue tracker="cve" id="2022-2287"/> <issue tracker="cve" id="2022-2304"/> <issue tracker="cve" id="2022-2889"/> <issue tracker="cve" id="2022-3016"/> <issue tracker="cve" id="2022-2580"/> <issue tracker="cve" id="2022-2862"/> <issue tracker="cve" id="2022-2210"/> <issue tracker="cve" id="2022-2522"/> <issue tracker="cve" id="2022-2845"/> <issue tracker="cve" id="2022-2257"/> <issue tracker="cve" id="2022-2571"/> <issue tracker="cve" id="2022-2175"/> <issue tracker="cve" id="2022-2264"/> <issue tracker="cve" id="2022-2124"/> <issue tracker="cve" id="2022-2343"/> <issue tracker="cve" id="2022-2817"/> <issue tracker="cve" id="2022-2819"/> <issue tracker="cve" id="2022-2849"/> <issue tracker="cve" id="2022-2946"/> <issue tracker="cve" id="2022-2923"/> <issue tracker="cve" id="2022-2284"/> <issue tracker="cve" id="2022-2206"/> <issue tracker="cve" id="2022-2874"/> <issue tracker="cve" id="2022-2183"/> <issue tracker="cve" id="2022-2208"/> <issue tracker="cve" id="2022-2182"/> <issue tracker="cve" id="2022-2125"/> <packager>bzoltan1</packager> <rating>important</rating> <category>security</category> <summary>Security update for vim</summary> <description>This update for vim fixes the following issues: Updated to version 9.0 with patch level 0313: - CVE-2022-2183: Fixed out-of-bounds read through get_lisp_indent() (bsc#1200902). - CVE-2022-2182: Fixed heap-based buffer overflow through parse_cmd_address() (bsc#1200903). - CVE-2022-2175: Fixed buffer over-read through cmdline_insert_reg() (bsc#1200904). - CVE-2022-2304: Fixed stack buffer overflow in spell_dump_compl() (bsc#1201249). - CVE-2022-2343: Fixed heap-based buffer overflow in GitHub repository vim prior to 9.0.0044 (bsc#1201356). - CVE-2022-2344: Fixed another heap-based buffer overflow vim prior to 9.0.0045 (bsc#1201359). - CVE-2022-2345: Fixed use after free in GitHub repository vim prior to 9.0.0046. (bsc#1201363). - CVE-2022-2819: Fixed heap-based Buffer Overflow in compile_lock_unlock() (bsc#1202414). - CVE-2022-2874: Fixed NULL Pointer Dereference in generate_loadvar() (bsc#1202552). - CVE-2022-1968: Fixed use after free in utf_ptr2char (bsc#1200270). - CVE-2022-2124: Fixed out of bounds read in current_quote() (bsc#1200697). - CVE-2022-2125: Fixed out of bounds read in get_lisp_indent() (bsc#1200698). - CVE-2022-2126: Fixed out of bounds read in suggest_trie_walk() (bsc#1200700). - CVE-2022-2129: Fixed out of bounds write in vim_regsub_both() (bsc#1200701). - CVE-2022-1720: Fixed out of bounds read in grab_file_name() (bsc#1200732). - CVE-2022-2264: Fixed out of bounds read in inc() (bsc#1201132). - CVE-2022-2284: Fixed out of bounds read in utfc_ptr2len() (bsc#1201133). - CVE-2022-2285: Fixed negative size passed to memmove() due to integer overflow (bsc#1201134). - CVE-2022-2286: Fixed out of bounds read in ins_bytes() (bsc#1201135). - CVE-2022-2287: Fixed out of bounds read in suggest_trie_walk() (bsc#1201136). - CVE-2022-2231: Fixed null pointer dereference skipwhite() (bsc#1201150). - CVE-2022-2210: Fixed out of bounds read in ml_append_int() (bsc#1201151). - CVE-2022-2208: Fixed null pointer dereference in diff_check() (bsc#1201152). - CVE-2022-2207: Fixed out of bounds read in ins_bs() (bsc#1201153). - CVE-2022-2257: Fixed out of bounds read in msg_outtrans_special() (bsc#1201154). - CVE-2022-2206: Fixed out of bounds read in msg_outtrans_attr() (bsc#1201155). - CVE-2022-2522: Fixed out of bounds read via nested autocommand (bsc#1201863). - CVE-2022-2571: Fixed heap-based buffer overflow related to ins_comp_get_next_word_or_line() (bsc#1202046). - CVE-2022-2580: Fixed heap-based buffer overflow related to eval_string() (bsc#1202049). - CVE-2022-2581: Fixed out-of-bounds read related to cstrchr() (bsc#1202050). - CVE-2022-2598: Fixed undefined behavior for Input to API related to diff_mark_adjust_tp() and ex_diffgetput() (bsc#1202051). - CVE-2022-2817: Fixed use after gree in f_assert_fails() (bsc#1202420). - CVE-2022-2816: Fixed out-of-bounds Read in check_vim9_unlet() (bsc#1202421). - CVE-2022-2862: Fixed use-after-free in compile_nested_function() (bsc#1202511). - CVE-2022-2849: Fixed invalid memory access related to mb_ptr2len() (bsc#1202512). - CVE-2022-2845: Fixed buffer Over-read related to display_dollar() (bsc#1202515). - CVE-2022-2889: Fixed use-after-free in find_var_also_in_script() in evalvars.c (bsc#1202599). - CVE-2022-2923: Fixed NULL pointer dereference in GitHub repository vim/vim prior to 9.0.0240 (bsc#1202687). - CVE-2022-2946: Fixed use after free in function vim_vsnprintf_typval (bsc#1202689). - CVE-2022-3016: Fixed use after free in vim prior to 9.0.0285 (bsc#1202862). Bugfixes: - Fixing vim error on startup (bsc#1200884). - Fixing vim SUSE Linux Enterprise Server 15 SP4 Basesystem plugin-tlib issue (bsc#1201620). </description> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor