SUSE-SU-2022:4282-1 -- SLES vim, gvimID: oval:org.secpod.oval:def:89047982 | Date: (C)2022-12-05 (M)2024-02-19 |
Class: PATCH | Family: unix |
This update for vim fixes the following issues: Updated to version 9.0 with patch level 0814: - CVE-2021-3928: Fixed stack-based buffer overflow . - CVE-2022-3234: Fixed heap-based buffer overflow . - CVE-2022-3235: Fixed use-after-free . - CVE-2022-3324: Fixed stack-based buffer overflow . - CVE-2022-3705: Fixed use-after-free in function qf_update_buffer of the file quickfix.c . - CVE-2022-2982: Fixed use-after-free in qf_fill_buffer . - CVE-2022-3296: Fixed stack out of bounds read in ex_finally in ex_eval.c . - CVE-2022-3297: Fixed use-after-free in process_next_cpt_value at insexpand.c . - CVE-2022-3099: Fixed use-after-free in ex_docmd.c . - CVE-2022-3134: Fixed use-after-free in do_tag . - CVE-2022-3153: Fixed NULL pointer dereference . - CVE-2022-3278: Fixed NULL pointer dereference in eval_next_non_blank in eval.c . - CVE-2022-3352: Fixed use-after-free . - CVE-2022-2980: Fixed NULL pointer dereference in do_mouse . - CVE-2022-3037: Fixed use-after-free .
Platform: |
SUSE Linux Enterprise Server 15 |
SUSE Linux Enterprise Desktop 15 SP4 |
SUSE Linux Enterprise Server 15 SP4 |
SUSE Linux Enterprise Desktop 15 SP3 |
SUSE Linux Enterprise Server 15 SP2 |
SUSE Linux Enterprise Server 15 SP3 |
SUSE Linux Enterprise Server 15 SP1 |