[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256488

 
 

909

 
 

199193

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2022:4282-1 -- SLES vim, gvim

ID: oval:org.secpod.oval:def:89047982Date: (C)2022-12-05   (M)2024-02-19
Class: PATCHFamily: unix




This update for vim fixes the following issues: Updated to version 9.0 with patch level 0814: - CVE-2021-3928: Fixed stack-based buffer overflow . - CVE-2022-3234: Fixed heap-based buffer overflow . - CVE-2022-3235: Fixed use-after-free . - CVE-2022-3324: Fixed stack-based buffer overflow . - CVE-2022-3705: Fixed use-after-free in function qf_update_buffer of the file quickfix.c . - CVE-2022-2982: Fixed use-after-free in qf_fill_buffer . - CVE-2022-3296: Fixed stack out of bounds read in ex_finally in ex_eval.c . - CVE-2022-3297: Fixed use-after-free in process_next_cpt_value at insexpand.c . - CVE-2022-3099: Fixed use-after-free in ex_docmd.c . - CVE-2022-3134: Fixed use-after-free in do_tag . - CVE-2022-3153: Fixed NULL pointer dereference . - CVE-2022-3278: Fixed NULL pointer dereference in eval_next_non_blank in eval.c . - CVE-2022-3352: Fixed use-after-free . - CVE-2022-2980: Fixed NULL pointer dereference in do_mouse . - CVE-2022-3037: Fixed use-after-free .

Platform:
SUSE Linux Enterprise Server 15
SUSE Linux Enterprise Desktop 15 SP4
SUSE Linux Enterprise Server 15 SP4
SUSE Linux Enterprise Desktop 15 SP3
SUSE Linux Enterprise Server 15 SP2
SUSE Linux Enterprise Server 15 SP3
SUSE Linux Enterprise Server 15 SP1
Product:
vim
gvim
Reference:
SUSE-SU-2022:4282-1
CVE-2021-3928
CVE-2022-2980
CVE-2022-2982
CVE-2022-3037
CVE-2022-3099
CVE-2022-3134
CVE-2022-3153
CVE-2022-3234
CVE-2022-3235
CVE-2022-3278
CVE-2022-3296
CVE-2022-3297
CVE-2022-3324
CVE-2022-3352
CVE-2022-3705
CVE    15
CVE-2022-3278
CVE-2022-3297
CVE-2022-3296
CVE-2022-3235
...

© SecPod Technologies