Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-3984 (GCVE-0-2021-3984)
Vulnerability from cvelistv5 – Published: 2021-12-01 00:00 – Updated: 2024-08-03 17:09- CWE-122 - Heap-based Buffer Overflow
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:09:09.762Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655"
},
{
"name": "FEDORA-2021-b0ac29efb1",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/"
},
{
"name": "[oss-security] 20220114 Re: 3 new CVE\u0027s in vim",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/01/15/1"
},
{
"name": "[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html"
},
{
"name": "GLSA-202208-32",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"name": "[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "vim/vim",
"vendor": "vim",
"versions": [
{
"lessThan": "8.2.3625",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "vim is vulnerable to Heap-based Buffer Overflow"
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "CWE-122 Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-11-08T00:00:00.000Z",
"orgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
"shortName": "@huntrdev"
},
"references": [
{
"url": "https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a"
},
{
"url": "https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655"
},
{
"name": "FEDORA-2021-b0ac29efb1",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/"
},
{
"name": "[oss-security] 20220114 Re: 3 new CVE\u0027s in vim",
"tags": [
"mailing-list"
],
"url": "http://www.openwall.com/lists/oss-security/2022/01/15/1"
},
{
"name": "[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html"
},
{
"name": "GLSA-202208-32",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"name": "[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html"
}
],
"source": {
"advisory": "b114b5a2-18e2-49f0-b350-15994d71426a",
"discovery": "EXTERNAL"
},
"title": "Heap-based Buffer Overflow in vim/vim"
}
},
"cveMetadata": {
"assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
"assignerShortName": "@huntrdev",
"cveId": "CVE-2021-3984",
"datePublished": "2021-12-01T00:00:00.000Z",
"dateReserved": "2021-11-19T00:00:00.000Z",
"dateUpdated": "2024-08-03T17:09:09.762Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-3984",
"date": "2026-05-19",
"epss": "0.00177",
"percentile": "0.38788"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"8.2.3625\", \"matchCriteriaId\": \"9C1A195C-3CB1-4AC1-A0B8-64088A27726F\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"vim is vulnerable to Heap-based Buffer Overflow\"}, {\"lang\": \"es\", \"value\": \"vim es vulnerable a un Desbordamiento del B\\u00fafer en la regi\\u00f3n Heap de la Memoria\"}]",
"id": "CVE-2021-3984",
"lastModified": "2024-11-21T06:23:18.473",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV30\": [{\"source\": \"security@huntr.dev\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.5}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2021-12-01T11:15:07.797",
"references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2022/01/15/1\", \"source\": \"security@huntr.dev\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655\", \"source\": \"security@huntr.dev\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a\", \"source\": \"security@huntr.dev\", \"tags\": [\"Exploit\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html\", \"source\": \"security@huntr.dev\", \"tags\": [\"Mitigation\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html\", \"source\": \"security@huntr.dev\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/\", \"source\": \"security@huntr.dev\"}, {\"url\": \"https://security.gentoo.org/glsa/202208-32\", \"source\": \"security@huntr.dev\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/01/15/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mitigation\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/202208-32\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "security@huntr.dev",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security@huntr.dev\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-122\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-3984\",\"sourceIdentifier\":\"security@huntr.dev\",\"published\":\"2021-12-01T11:15:07.797\",\"lastModified\":\"2024-11-21T06:23:18.473\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"vim is vulnerable to Heap-based Buffer Overflow\"},{\"lang\":\"es\",\"value\":\"vim es vulnerable a un Desbordamiento del B\u00fafer en la regi\u00f3n Heap de la Memoria\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.5}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"security@huntr.dev\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-122\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2.3625\",\"matchCriteriaId\":\"9C1A195C-3CB1-4AC1-A0B8-64088A27726F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2022/01/15/1\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655\",\"source\":\"security@huntr.dev\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a\",\"source\":\"security@huntr.dev\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/\",\"source\":\"security@huntr.dev\"},{\"url\":\"https://security.gentoo.org/glsa/202208-32\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/01/15/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202208-32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2022-AVI-330
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Stormshield Network Security. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 2.7.x antérieures à 2.7.10 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.7.x antérieures à 3.7.27 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 4.3.x antérieures à 4.3.7 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.11.x antérieures à 3.11.15 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 4.2.x antérieures à 4.2.11 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Network Security versions 2.7.x ant\u00e9rieures \u00e0 2.7.10",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 3.7.x ant\u00e9rieures \u00e0 3.7.27",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 4.3.x ant\u00e9rieures \u00e0 4.3.7",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 3.11.x ant\u00e9rieures \u00e0 3.11.15",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 4.2.x ant\u00e9rieures \u00e0 4.2.11",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-0261",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0261"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2021-3968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3968"
},
{
"name": "CVE-2021-4019",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4019"
},
{
"name": "CVE-2021-4192",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4192"
},
{
"name": "CVE-2022-0393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0393"
},
{
"name": "CVE-2022-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0408"
},
{
"name": "CVE-2021-4173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4173"
},
{
"name": "CVE-2021-4136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4136"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2021-3928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3928"
},
{
"name": "CVE-2022-0417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0417"
},
{
"name": "CVE-2022-0368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0368"
},
{
"name": "CVE-2021-4166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4166"
},
{
"name": "CVE-2022-0128",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0128"
},
{
"name": "CVE-2022-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0443"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2021-3984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3984"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2022-0413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0413"
},
{
"name": "CVE-2022-20698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20698"
},
{
"name": "CVE-2021-3974",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3974"
},
{
"name": "CVE-2022-0392",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0392"
},
{
"name": "CVE-2022-0359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0359"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0361"
},
{
"name": "CVE-2021-4069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4069"
},
{
"name": "CVE-2022-0318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0318"
},
{
"name": "CVE-2021-4187",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4187"
},
{
"name": "CVE-2021-3927",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3927"
},
{
"name": "CVE-2022-0407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0407"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-330",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Stormshield Network\nSecurity. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Stormshield Network Security",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2022-008 du 06 avril 2022",
"url": "https://advisories.stormshield.eu/2022-008/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2022-004 du 06 avril 2022",
"url": "https://advisories.stormshield.eu/2022-004/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2022-005 du 06 avril 2022",
"url": "https://advisories.stormshield.eu/2022-005/"
}
]
}
CERTFR-2022-AVI-330
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Stormshield Network Security. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 2.7.x antérieures à 2.7.10 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.7.x antérieures à 3.7.27 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 4.3.x antérieures à 4.3.7 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 3.11.x antérieures à 3.11.15 | ||
| Stormshield | Stormshield Network Security | Stormshield Network Security versions 4.2.x antérieures à 4.2.11 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Network Security versions 2.7.x ant\u00e9rieures \u00e0 2.7.10",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 3.7.x ant\u00e9rieures \u00e0 3.7.27",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 4.3.x ant\u00e9rieures \u00e0 4.3.7",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 3.11.x ant\u00e9rieures \u00e0 3.11.15",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Stormshield Network Security versions 4.2.x ant\u00e9rieures \u00e0 4.2.11",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-0261",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0261"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2021-3968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3968"
},
{
"name": "CVE-2021-4019",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4019"
},
{
"name": "CVE-2021-4192",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4192"
},
{
"name": "CVE-2022-0393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0393"
},
{
"name": "CVE-2022-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0408"
},
{
"name": "CVE-2021-4173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4173"
},
{
"name": "CVE-2021-4136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4136"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2021-3928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3928"
},
{
"name": "CVE-2022-0417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0417"
},
{
"name": "CVE-2022-0368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0368"
},
{
"name": "CVE-2021-4166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4166"
},
{
"name": "CVE-2022-0128",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0128"
},
{
"name": "CVE-2022-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0443"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2021-3984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3984"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2022-0413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0413"
},
{
"name": "CVE-2022-20698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20698"
},
{
"name": "CVE-2021-3974",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3974"
},
{
"name": "CVE-2022-0392",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0392"
},
{
"name": "CVE-2022-0359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0359"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0361"
},
{
"name": "CVE-2021-4069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4069"
},
{
"name": "CVE-2022-0318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0318"
},
{
"name": "CVE-2021-4187",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4187"
},
{
"name": "CVE-2021-3927",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3927"
},
{
"name": "CVE-2022-0407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0407"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-330",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-04-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Stormshield Network\nSecurity. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Stormshield Network Security",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2022-008 du 06 avril 2022",
"url": "https://advisories.stormshield.eu/2022-008/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2022-004 du 06 avril 2022",
"url": "https://advisories.stormshield.eu/2022-004/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2022-005 du 06 avril 2022",
"url": "https://advisories.stormshield.eu/2022-005/"
}
]
}
alsa-2022:0366
Vulnerability from osv_almalinux
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
-
vim: heap-based buffer overflow in win_redr_status() in drawscreen.c (CVE-2021-3872)
-
vim: illegal memory access in find_start_brace() in cindent.c when C-indenting (CVE-2021-3984)
-
vim: heap-based buffer overflow in find_help_tags() in help.c (CVE-2021-4019)
-
vim: use-after-free in win_linetabsize() (CVE-2021-4192)
-
vim: out-of-bound read in getvcol() (CVE-2021-4193)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "vim-X11"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:8.0.1763-16.el8_5.13"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "vim-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:8.0.1763-16.el8_5.13"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "vim-enhanced"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:8.0.1763-16.el8_5.13"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "vim-filesystem"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:8.0.1763-16.el8_5.13"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "vim-minimal"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:8.0.1763-16.el8_5.13"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: heap-based buffer overflow in win_redr_status() in drawscreen.c (CVE-2021-3872)\n\n* vim: illegal memory access in find_start_brace() in cindent.c when C-indenting (CVE-2021-3984)\n\n* vim: heap-based buffer overflow in find_help_tags() in help.c (CVE-2021-4019)\n\n* vim: use-after-free in win_linetabsize() (CVE-2021-4192)\n\n* vim: out-of-bound read in getvcol() (CVE-2021-4193)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2022:0366",
"modified": "2022-02-02T11:55:08Z",
"published": "2022-02-01T20:12:46Z",
"references": [
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2022-0366.html"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-3872"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-3984"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-4019"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-4192"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-4193"
}
],
"related": [
"CVE-2021-3872",
"CVE-2021-3984",
"CVE-2021-4019",
"CVE-2021-4192",
"CVE-2021-4193"
],
"summary": "Moderate: vim security update"
}
BDU:2022-05501
Vulnerability from fstec - Published: 01.12.2021{
"CVSS 2.0": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Canonical Ltd., \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Fedora Project, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\", \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb, \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb, IBM Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "6 (Red Hat Enterprise Linux), 7 (Red Hat Enterprise Linux), 9 (Debian GNU/Linux), 18.04 LTS (Ubuntu), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 8 (Red Hat Enterprise Linux), 10 (Debian GNU/Linux), 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb), 20.04 LTS (Ubuntu), 34 (Fedora), 16.04 ESM (Ubuntu), 11 (Debian GNU/Linux), 21.10 (Ubuntu), 1.7 (Astra Linux Special Edition), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), \u0434\u043e 9.0.0357 (vim), 4.7 (Astra Linux Special Edition), \u0434\u043e 2.6 (\u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx), 2.1 (ROSA Virtualization), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb), \u0434\u043e 21.0.2.2 (IBM Robotic Process Automation)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Vim:\nhttps://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655\n\n\u0414\u043b\u044f Fedora:\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://lists.debian.org/debian-lts-announce/2022/03/msg00018.html\nhttps://security-tracker.debian.org/tracker/CVE-2021-3984\n\n\u0414\u043b\u044f Ubuntu:\nhttps://ubuntu.com/security/notices/USN-5247-1\nhttps://ubuntu.com/security/notices/USN-5433-1\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2021-3984\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-1011SE17MD\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430\n\n\u0414\u043b\u044f \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f vim \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2:9.0.0626-1\n\n\u0414\u043b\u044f Astra Linux Special Edition 4.7: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-1121SE47\n\n\u0414\u043b\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0440\u0435\u0434\u043e\u0439 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u00abROSA Virtualization\u00bb : https://abf.rosalinux.ru/advisories/ROSA-SA-2023-2214\n\n\u0414\u043b\u044f Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 vim \u0434\u043e 2:9.0.0242-1.astra1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se81-bulletin-20230315SE81\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f vim \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2:8.0.0197-4+deb9u7",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "01.12.2021",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "31.07.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "05.09.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-05501",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-3984",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Debian GNU/Linux, Ubuntu, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), Fedora, \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), vim, \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), ROSA Virtualization (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165091), \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177), IBM Robotic Process Automation",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 6 , Red Hat Inc. Red Hat Enterprise Linux 7 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Canonical Ltd. Ubuntu 18.04 LTS , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Red Hat Inc. Red Hat Enterprise Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), Canonical Ltd. Ubuntu 20.04 LTS , Fedora Project Fedora 34 , Canonical Ltd. Ubuntu 16.04 ESM , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , Canonical Ltd. Ubuntu 21.10 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \"\u041d\u041f\u041f\u041a\u0422\" \u041e\u0421\u041e\u041d \u041e\u0421\u043d\u043e\u0432\u0430 \u041enyx \u0434\u043e 2.6 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165913), \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb ROSA Virtualization 2.1 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165091), \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u043e\u0433\u043e \u0440\u0435\u0434\u0430\u043a\u0442\u043e\u0440\u0430 Vim, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0432\u044b\u0445\u043e\u0434\u043e\u043c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c, \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0417\u0430\u043f\u0438\u0441\u044c \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-787)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u043e\u0433\u043e \u0440\u0435\u0434\u0430\u043a\u0442\u043e\u0440\u0430 Vim \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u044b\u0445\u043e\u0434\u043e\u043c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c, \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a/\nhttps://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/\nhttps://lists.debian.org/debian-lts-announce/2022/03/msg00018.html\nhttps://security-tracker.debian.org/tracker/CVE-2021-3984\nhttps://ubuntu.com/security/notices/USN-5247-1\nhttps://ubuntu.com/security/notices/USN-5433-1\nhttps://access.redhat.com/security/cve/cve-2021-3984\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20220829SE16\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2022-1011SE17MD\nhttps://altsp.su/obnovleniya-bezopasnosti/\nhttps://\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430.\u043d\u043f\u043f\u043a\u0442.\u0440\u0444/bin/view/\u041e\u0421\u043d\u043e\u0432\u0430/\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f/2.6/\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2022-1121SE47\nhttps://abf.rosalinux.ru/advisories/ROSA-SA-2023-2214\nhttps://wiki.astralinux.ru/astra-linux-se81-bulletin-20230315SE81\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-787",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,2)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)"
}
CNVD-2022-05067
Vulnerability from cnvd - Published: 2022-01-19厂商已发布了漏洞修复程序,请及时关注更新: https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
| Name | Vim Vim |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-3984"
}
},
"description": "Vim\u662f\u4e00\u6b3e\u57fa\u4e8eUNIX\u5e73\u53f0\u7684\u7f16\u8f91\u5668\u3002\n\nVim\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u7f13\u51b2\u533a\u6ea2\u51fa\u653b\u51fb\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2022-05067",
"openTime": "2022-01-19",
"patchDescription": "Vim\u662f\u4e00\u6b3e\u57fa\u4e8eUNIX\u5e73\u53f0\u7684\u7f16\u8f91\u5668\u3002\r\n\r\nVim\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u7f13\u51b2\u533a\u6ea2\u51fa\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Vim\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Vim Vim"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-3984",
"serverity": "\u4e2d",
"submitTime": "2021-12-02",
"title": "Vim\u5b58\u5728\u672a\u660e\u6f0f\u6d1e"
}
FKIE_CVE-2021-3984
Vulnerability from fkie_nvd - Published: 2021-12-01 11:15 - Updated: 2024-11-21 06:23| Vendor | Product | Version | |
|---|---|---|---|
| vim | vim | * | |
| fedoraproject | fedora | 34 | |
| debian | debian_linux | 9.0 | |
| debian | debian_linux | 10.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C1A195C-3CB1-4AC1-A0B8-64088A27726F",
"versionEndExcluding": "8.2.3625",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "vim is vulnerable to Heap-based Buffer Overflow"
},
{
"lang": "es",
"value": "vim es vulnerable a un Desbordamiento del B\u00fafer en la regi\u00f3n Heap de la Memoria"
}
],
"id": "CVE-2021-3984",
"lastModified": "2024-11-21T06:23:18.473",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.5,
"source": "security@huntr.dev",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-12-01T11:15:07.797",
"references": [
{
"source": "security@huntr.dev",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/01/15/1"
},
{
"source": "security@huntr.dev",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655"
},
{
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a"
},
{
"source": "security@huntr.dev",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html"
},
{
"source": "security@huntr.dev",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html"
},
{
"source": "security@huntr.dev",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/"
},
{
"source": "security@huntr.dev",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/01/15/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-32"
}
],
"sourceIdentifier": "security@huntr.dev",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-122"
}
],
"source": "security@huntr.dev",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
}
GHSA-4JR3-2X33-XQGG
Vulnerability from github – Published: 2021-12-02 00:00 – Updated: 2022-03-17 00:06vim is vulnerable to Heap-based Buffer Overflow
{
"affected": [],
"aliases": [
"CVE-2021-3984"
],
"database_specific": {
"cwe_ids": [
"CWE-122",
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-12-01T11:15:00Z",
"severity": "HIGH"
},
"details": "vim is vulnerable to Heap-based Buffer Overflow",
"id": "GHSA-4jr3-2x33-xqgg",
"modified": "2022-03-17T00:06:40Z",
"published": "2021-12-02T00:00:51Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3984"
},
{
"type": "WEB",
"url": "https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655"
},
{
"type": "WEB",
"url": "https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2022/01/15/1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2021-3984
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-3984",
"description": "vim is vulnerable to Heap-based Buffer Overflow",
"id": "GSD-2021-3984",
"references": [
"https://www.suse.com/security/cve/CVE-2021-3984.html",
"https://access.redhat.com/errata/RHSA-2022:0366",
"https://ubuntu.com/security/CVE-2021-3984",
"https://security.archlinux.org/CVE-2021-3984",
"https://alas.aws.amazon.com/cve/html/CVE-2021-3984.html",
"https://linux.oracle.com/cve/CVE-2021-3984.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-3984"
],
"details": "vim is vulnerable to Heap-based Buffer Overflow",
"id": "GSD-2021-3984",
"modified": "2023-12-13T01:23:35.113917Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2021-3984",
"STATE": "PUBLIC",
"TITLE": "Heap-based Buffer Overflow in vim/vim"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "vim/vim",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "8.2.3625"
}
]
}
}
]
},
"vendor_name": "vim"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "vim is vulnerable to Heap-based Buffer Overflow"
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122 Heap-based Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a"
},
{
"name": "https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655",
"refsource": "MISC",
"url": "https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655"
},
{
"name": "FEDORA-2021-b0ac29efb1",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/"
},
{
"name": "[oss-security] 20220114 Re: 3 new CVE\u0027s in vim",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/01/15/1"
},
{
"name": "[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html"
},
{
"name": "GLSA-202208-32",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"name": "[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html"
}
]
},
"source": {
"advisory": "b114b5a2-18e2-49f0-b350-15994d71426a",
"discovery": "EXTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.2.3625",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2021-3984"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "vim is vulnerable to Heap-based Buffer Overflow"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655"
},
{
"name": "https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a",
"refsource": "CONFIRM",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a"
},
{
"name": "FEDORA-2021-b0ac29efb1",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/"
},
{
"name": "[oss-security] 20220114 Re: 3 new CVE\u0027s in vim",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/01/15/1"
},
{
"name": "[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update",
"refsource": "MLIST",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html"
},
{
"name": "GLSA-202208-32",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"name": "[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-11-09T03:12Z",
"publishedDate": "2021-12-01T11:15Z"
}
}
}
MSRC_CVE-2021-3984
Vulnerability from csaf_microsoft - Published: 2021-12-02 00:00 - Updated: 2021-12-16 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 18946-16820 | — | ||
| Unresolved product id: 18812-17086 | — |
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2021/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2021/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2021-3984 Heap-based Buffer Overflow in vim/vim - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-3984.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Heap-based Buffer Overflow in vim/vim",
"tracking": {
"current_release_date": "2021-12-16T00:00:00.000Z",
"generator": {
"date": "2025-10-19T22:29:46.215Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2021-3984",
"initial_release_date": "2021-12-02T00:00:00.000Z",
"revision_history": [
{
"date": "2021-12-04T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2021-12-16T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added vim to CBL-Mariner 2.0"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 vim 8.2.3668-1",
"product": {
"name": "\u003ccm1 vim 8.2.3668-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cm1 vim 8.2.3668-1",
"product": {
"name": "cm1 vim 8.2.3668-1",
"product_id": "18946"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 vim 8.2.4081-1",
"product": {
"name": "\u003ccbl2 vim 8.2.4081-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 vim 8.2.4081-1",
"product": {
"name": "cbl2 vim 8.2.4081-1",
"product_id": "18812"
}
}
],
"category": "product_name",
"name": "vim"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 vim 8.2.3668-1 as a component of CBL Mariner 1.0",
"product_id": "16820-1"
},
"product_reference": "1",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 vim 8.2.3668-1 as a component of CBL Mariner 1.0",
"product_id": "18946-16820"
},
"product_reference": "18946",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 vim 8.2.4081-1 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 vim 8.2.4081-1 as a component of CBL Mariner 2.0",
"product_id": "18812-17086"
},
"product_reference": "18812",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3984",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "general",
"text": "@huntrdev",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"18946-16820",
"18812-17086"
],
"known_affected": [
"16820-1",
"17086-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-3984 Heap-based Buffer Overflow in vim/vim - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-3984.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2021-12-04T00:00:00.000Z",
"details": "8.2.3668-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2021-12-04T00:00:00.000Z",
"details": "8.2.4081-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"16820-1",
"17086-2"
]
}
],
"title": "Heap-based Buffer Overflow in vim/vim"
}
]
}
OPENSUSE-SU-2022:0736-1
Vulnerability from csaf_opensuse - Published: 2022-03-04 13:52 - Updated: 2022-03-04 13:52| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for vim",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for vim fixes the following issues:\n\n- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).\n- CVE-2021-3796: Fixed use-after-free in nv_replace() in normal.c (bsc#1190570).\n- CVE-2021-3872: Fixed heap-based buffer overflow in win_redr_status() drawscreen.c (bsc#1191893).\n- CVE-2021-3927: Fixed heap-based buffer overflow (bsc#1192481).\n- CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).\n- CVE-2021-4019: Fixed heap-based buffer overflow (bsc#1193294).\n- CVE-2021-3984: Fixed illegal memory access when C-indenting could have led to heap buffer overflow (bsc#1193298).\n- CVE-2021-3778: Fixed heap-based buffer overflow in regexp_nfa.c (bsc#1190533).\n- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).\n- CVE-2021-46059: Fixed pointer dereference vulnerability via the vim_regexec_multi function at regexp.c (bsc#1194556).\n- CVE-2022-0319: Fixded out-of-bounds read (bsc#1195066).\n- CVE-2022-0351: Fixed uncontrolled recursion in eval7() (bsc#1195126).\n- CVE-2022-0361: Fixed buffer overflow (bsc#1195126).\n- CVE-2022-0413: Fixed use-after-free in src/ex_cmds.c (bsc#1195356).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2022-736,openSUSE-SLE-15.4-2022-736",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0736-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:0736-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:0736-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/"
},
{
"category": "self",
"summary": "SUSE Bug 1190533",
"url": "https://bugzilla.suse.com/1190533"
},
{
"category": "self",
"summary": "SUSE Bug 1190570",
"url": "https://bugzilla.suse.com/1190570"
},
{
"category": "self",
"summary": "SUSE Bug 1191893",
"url": "https://bugzilla.suse.com/1191893"
},
{
"category": "self",
"summary": "SUSE Bug 1192478",
"url": "https://bugzilla.suse.com/1192478"
},
{
"category": "self",
"summary": "SUSE Bug 1192481",
"url": "https://bugzilla.suse.com/1192481"
},
{
"category": "self",
"summary": "SUSE Bug 1193294",
"url": "https://bugzilla.suse.com/1193294"
},
{
"category": "self",
"summary": "SUSE Bug 1193298",
"url": "https://bugzilla.suse.com/1193298"
},
{
"category": "self",
"summary": "SUSE Bug 1194216",
"url": "https://bugzilla.suse.com/1194216"
},
{
"category": "self",
"summary": "SUSE Bug 1194556",
"url": "https://bugzilla.suse.com/1194556"
},
{
"category": "self",
"summary": "SUSE Bug 1195004",
"url": "https://bugzilla.suse.com/1195004"
},
{
"category": "self",
"summary": "SUSE Bug 1195066",
"url": "https://bugzilla.suse.com/1195066"
},
{
"category": "self",
"summary": "SUSE Bug 1195126",
"url": "https://bugzilla.suse.com/1195126"
},
{
"category": "self",
"summary": "SUSE Bug 1195202",
"url": "https://bugzilla.suse.com/1195202"
},
{
"category": "self",
"summary": "SUSE Bug 1195356",
"url": "https://bugzilla.suse.com/1195356"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3778 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3796 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3872 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3927 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3927/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3928 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3928/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3984 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4019 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4019/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4193 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4193/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46059 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0318 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0319 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0351 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0361 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0413 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0413/"
}
],
"title": "Security update for vim",
"tracking": {
"current_release_date": "2022-03-04T13:52:29Z",
"generator": {
"date": "2022-03-04T13:52:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:0736-1",
"initial_release_date": "2022-03-04T13:52:29Z",
"revision_history": [
{
"date": "2022-03-04T13:52:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gvim-8.0.1568-5.17.1.aarch64",
"product": {
"name": "gvim-8.0.1568-5.17.1.aarch64",
"product_id": "gvim-8.0.1568-5.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "vim-8.0.1568-5.17.1.aarch64",
"product": {
"name": "vim-8.0.1568-5.17.1.aarch64",
"product_id": "vim-8.0.1568-5.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "vim-small-8.0.1568-5.17.1.aarch64",
"product": {
"name": "vim-small-8.0.1568-5.17.1.aarch64",
"product_id": "vim-small-8.0.1568-5.17.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-data-8.0.1568-5.17.1.noarch",
"product": {
"name": "vim-data-8.0.1568-5.17.1.noarch",
"product_id": "vim-data-8.0.1568-5.17.1.noarch"
}
},
{
"category": "product_version",
"name": "vim-data-common-8.0.1568-5.17.1.noarch",
"product": {
"name": "vim-data-common-8.0.1568-5.17.1.noarch",
"product_id": "vim-data-common-8.0.1568-5.17.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-8.0.1568-5.17.1.ppc64le",
"product": {
"name": "gvim-8.0.1568-5.17.1.ppc64le",
"product_id": "gvim-8.0.1568-5.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "vim-8.0.1568-5.17.1.ppc64le",
"product": {
"name": "vim-8.0.1568-5.17.1.ppc64le",
"product_id": "vim-8.0.1568-5.17.1.ppc64le"
}
},
{
"category": "product_version",
"name": "vim-small-8.0.1568-5.17.1.ppc64le",
"product": {
"name": "vim-small-8.0.1568-5.17.1.ppc64le",
"product_id": "vim-small-8.0.1568-5.17.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-8.0.1568-5.17.1.s390x",
"product": {
"name": "gvim-8.0.1568-5.17.1.s390x",
"product_id": "gvim-8.0.1568-5.17.1.s390x"
}
},
{
"category": "product_version",
"name": "vim-8.0.1568-5.17.1.s390x",
"product": {
"name": "vim-8.0.1568-5.17.1.s390x",
"product_id": "vim-8.0.1568-5.17.1.s390x"
}
},
{
"category": "product_version",
"name": "vim-small-8.0.1568-5.17.1.s390x",
"product": {
"name": "vim-small-8.0.1568-5.17.1.s390x",
"product_id": "vim-small-8.0.1568-5.17.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-8.0.1568-5.17.1.x86_64",
"product": {
"name": "gvim-8.0.1568-5.17.1.x86_64",
"product_id": "gvim-8.0.1568-5.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "vim-8.0.1568-5.17.1.x86_64",
"product": {
"name": "vim-8.0.1568-5.17.1.x86_64",
"product_id": "vim-8.0.1568-5.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "vim-small-8.0.1568-5.17.1.x86_64",
"product": {
"name": "vim-small-8.0.1568-5.17.1.x86_64",
"product_id": "vim-small-8.0.1568-5.17.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-8.0.1568-5.17.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64"
},
"product_reference": "gvim-8.0.1568-5.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-8.0.1568-5.17.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le"
},
"product_reference": "gvim-8.0.1568-5.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-8.0.1568-5.17.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x"
},
"product_reference": "gvim-8.0.1568-5.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-8.0.1568-5.17.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64"
},
"product_reference": "gvim-8.0.1568-5.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-8.0.1568-5.17.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64"
},
"product_reference": "vim-8.0.1568-5.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-8.0.1568-5.17.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le"
},
"product_reference": "vim-8.0.1568-5.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-8.0.1568-5.17.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x"
},
"product_reference": "vim-8.0.1568-5.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-8.0.1568-5.17.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64"
},
"product_reference": "vim-8.0.1568-5.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-8.0.1568-5.17.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch"
},
"product_reference": "vim-data-8.0.1568-5.17.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-8.0.1568-5.17.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch"
},
"product_reference": "vim-data-common-8.0.1568-5.17.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-8.0.1568-5.17.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64"
},
"product_reference": "vim-small-8.0.1568-5.17.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-8.0.1568-5.17.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le"
},
"product_reference": "vim-small-8.0.1568-5.17.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-8.0.1568-5.17.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x"
},
"product_reference": "vim-small-8.0.1568-5.17.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-8.0.1568-5.17.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
},
"product_reference": "vim-small-8.0.1568-5.17.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3778"
}
],
"notes": [
{
"category": "general",
"text": "vim is vulnerable to Heap-based Buffer Overflow",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3778",
"url": "https://www.suse.com/security/cve/CVE-2021-3778"
},
{
"category": "external",
"summary": "SUSE Bug 1190533 for CVE-2021-3778",
"url": "https://bugzilla.suse.com/1190533"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T13:52:29Z",
"details": "moderate"
}
],
"title": "CVE-2021-3778"
},
{
"cve": "CVE-2021-3796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3796"
}
],
"notes": [
{
"category": "general",
"text": "vim is vulnerable to Use After Free",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3796",
"url": "https://www.suse.com/security/cve/CVE-2021-3796"
},
{
"category": "external",
"summary": "SUSE Bug 1190570 for CVE-2021-3796",
"url": "https://bugzilla.suse.com/1190570"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T13:52:29Z",
"details": "moderate"
}
],
"title": "CVE-2021-3796"
},
{
"cve": "CVE-2021-3872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3872"
}
],
"notes": [
{
"category": "general",
"text": "vim is vulnerable to Heap-based Buffer Overflow",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3872",
"url": "https://www.suse.com/security/cve/CVE-2021-3872"
},
{
"category": "external",
"summary": "SUSE Bug 1191893 for CVE-2021-3872",
"url": "https://bugzilla.suse.com/1191893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T13:52:29Z",
"details": "important"
}
],
"title": "CVE-2021-3872"
},
{
"cve": "CVE-2021-3927",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3927"
}
],
"notes": [
{
"category": "general",
"text": "vim is vulnerable to Heap-based Buffer Overflow",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3927",
"url": "https://www.suse.com/security/cve/CVE-2021-3927"
},
{
"category": "external",
"summary": "SUSE Bug 1192481 for CVE-2021-3927",
"url": "https://bugzilla.suse.com/1192481"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T13:52:29Z",
"details": "moderate"
}
],
"title": "CVE-2021-3927"
},
{
"cve": "CVE-2021-3928",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3928"
}
],
"notes": [
{
"category": "general",
"text": "vim is vulnerable to Use of Uninitialized Variable",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3928",
"url": "https://www.suse.com/security/cve/CVE-2021-3928"
},
{
"category": "external",
"summary": "SUSE Bug 1192478 for CVE-2021-3928",
"url": "https://bugzilla.suse.com/1192478"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T13:52:29Z",
"details": "moderate"
}
],
"title": "CVE-2021-3928"
},
{
"cve": "CVE-2021-3984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3984"
}
],
"notes": [
{
"category": "general",
"text": "vim is vulnerable to Heap-based Buffer Overflow",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3984",
"url": "https://www.suse.com/security/cve/CVE-2021-3984"
},
{
"category": "external",
"summary": "SUSE Bug 1193298 for CVE-2021-3984",
"url": "https://bugzilla.suse.com/1193298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T13:52:29Z",
"details": "moderate"
}
],
"title": "CVE-2021-3984"
},
{
"cve": "CVE-2021-4019",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4019"
}
],
"notes": [
{
"category": "general",
"text": "vim is vulnerable to Heap-based Buffer Overflow",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4019",
"url": "https://www.suse.com/security/cve/CVE-2021-4019"
},
{
"category": "external",
"summary": "SUSE Bug 1193294 for CVE-2021-4019",
"url": "https://bugzilla.suse.com/1193294"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T13:52:29Z",
"details": "moderate"
}
],
"title": "CVE-2021-4019"
},
{
"cve": "CVE-2021-4193",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4193"
}
],
"notes": [
{
"category": "general",
"text": "vim is vulnerable to Out-of-bounds Read",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4193",
"url": "https://www.suse.com/security/cve/CVE-2021-4193"
},
{
"category": "external",
"summary": "SUSE Bug 1194216 for CVE-2021-4193",
"url": "https://bugzilla.suse.com/1194216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T13:52:29Z",
"details": "low"
}
],
"title": "CVE-2021-4193"
},
{
"cve": "CVE-2021-46059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46059"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46059",
"url": "https://www.suse.com/security/cve/CVE-2021-46059"
},
{
"category": "external",
"summary": "SUSE Bug 1194556 for CVE-2021-46059",
"url": "https://bugzilla.suse.com/1194556"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T13:52:29Z",
"details": "moderate"
}
],
"title": "CVE-2021-46059"
},
{
"cve": "CVE-2022-0318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0318"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0318",
"url": "https://www.suse.com/security/cve/CVE-2022-0318"
},
{
"category": "external",
"summary": "SUSE Bug 1195004 for CVE-2022-0318",
"url": "https://bugzilla.suse.com/1195004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T13:52:29Z",
"details": "moderate"
}
],
"title": "CVE-2022-0318"
},
{
"cve": "CVE-2022-0319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0319"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0319",
"url": "https://www.suse.com/security/cve/CVE-2022-0319"
},
{
"category": "external",
"summary": "SUSE Bug 1195066 for CVE-2022-0319",
"url": "https://bugzilla.suse.com/1195066"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T13:52:29Z",
"details": "low"
}
],
"title": "CVE-2022-0319"
},
{
"cve": "CVE-2022-0351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0351"
}
],
"notes": [
{
"category": "general",
"text": "Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0351",
"url": "https://www.suse.com/security/cve/CVE-2022-0351"
},
{
"category": "external",
"summary": "SUSE Bug 1195126 for CVE-2022-0351",
"url": "https://bugzilla.suse.com/1195126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T13:52:29Z",
"details": "low"
}
],
"title": "CVE-2022-0351"
},
{
"cve": "CVE-2022-0361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0361"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0361",
"url": "https://www.suse.com/security/cve/CVE-2022-0361"
},
{
"category": "external",
"summary": "SUSE Bug 1195202 for CVE-2022-0361",
"url": "https://bugzilla.suse.com/1195202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T13:52:29Z",
"details": "moderate"
}
],
"title": "CVE-2022-0361"
},
{
"cve": "CVE-2022-0413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0413"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0413",
"url": "https://www.suse.com/security/cve/CVE-2022-0413"
},
{
"category": "external",
"summary": "SUSE Bug 1195356 for CVE-2022-0413",
"url": "https://bugzilla.suse.com/1195356"
},
{
"category": "external",
"summary": "SUSE Bug 1208308 for CVE-2022-0413",
"url": "https://bugzilla.suse.com/1208308"
},
{
"category": "external",
"summary": "SUSE Bug 1208651 for CVE-2022-0413",
"url": "https://bugzilla.suse.com/1208651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:gvim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-8.0.1568-5.17.1.x86_64",
"openSUSE Leap 15.3:vim-data-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-data-common-8.0.1568-5.17.1.noarch",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.aarch64",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.ppc64le",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.s390x",
"openSUSE Leap 15.3:vim-small-8.0.1568-5.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T13:52:29Z",
"details": "important"
}
],
"title": "CVE-2022-0413"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.