SUSE-SU-2022:0736-1 -- SLES vim, gvimID: oval:org.secpod.oval:def:89046037 | Date: (C)2022-03-11 (M)2024-05-22 |
Class: PATCH | Family: unix |
This update for vim fixes the following issues: - CVE-2022-0318: Fixed heap-based buffer overflow . - CVE-2021-3796: Fixed use-after-free in nv_replace in normal.c . - CVE-2021-3872: Fixed heap-based buffer overflow in win_redr_status drawscreen.c . - CVE-2021-3927: Fixed heap-based buffer overflow . - CVE-2021-3928: Fixed stack-based buffer overflow . - CVE-2021-4019: Fixed heap-based buffer overflow . - CVE-2021-3984: Fixed illegal memory access when C-indenting could have led to heap buffer overflow . - CVE-2021-3778: Fixed heap-based buffer overflow in regexp_nfa.c . - CVE-2021-4193: Fixed out-of-bounds read . - CVE-2021-46059: Fixed pointer dereference vulnerability via the vim_regexec_multi function at regexp.c . - CVE-2022-0319: Fixded out-of-bounds read . - CVE-2022-0351: Fixed uncontrolled recursion in eval7 . - CVE-2022-0361: Fixed buffer overflow . - CVE-2022-0413: Fixed use-after-free in src/ex_cmds.c .
Platform: |
SUSE Linux Enterprise Server 15 |
SUSE Linux Enterprise Server 15 SP2 |
SUSE Linux Enterprise Server 15 SP1 |