Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2021-4136
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T17:16:04.242Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264", }, { name: "FEDORA-2022-a3d70b50f0", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/", }, { name: "[oss-security] 20220114 Re: 3 new CVE's in vim", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2022/01/15/1", }, { name: "FEDORA-2022-48b86d586f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT213183", }, { name: "20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2022/Mar/29", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT213256", }, { name: "20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2022/May/35", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT213343", }, { name: "20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2022/Jul/14", }, { name: "GLSA-202208-32", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/202208-32", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "vim/vim", vendor: "vim", versions: [ { lessThan: "8.2.3846", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], descriptions: [ { lang: "en", value: "vim is vulnerable to Heap-based Buffer Overflow", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122 Heap-based Buffer Overflow", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-08-21T07:07:32", orgId: "c09c270a-b464-47c1-9133-acb35b22c19a", shortName: "@huntrdev", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264", }, { name: "FEDORA-2022-a3d70b50f0", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/", }, { name: "[oss-security] 20220114 Re: 3 new CVE's in vim", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2022/01/15/1", }, { name: "FEDORA-2022-48b86d586f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT213183", }, { name: "20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2022/Mar/29", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT213256", }, { name: "20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2022/May/35", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT213343", }, { name: "20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2022/Jul/14", }, { name: "GLSA-202208-32", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/202208-32", }, ], source: { advisory: "5c6b93c1-2d27-4e98-a931-147877b8c938", discovery: "EXTERNAL", }, title: "Heap-based Buffer Overflow in vim/vim", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2021-4136", STATE: "PUBLIC", TITLE: "Heap-based Buffer Overflow in vim/vim", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "vim/vim", version: { version_data: [ { version_affected: "<", version_value: "8.2.3846", }, ], }, }, ], }, vendor_name: "vim", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "vim is vulnerable to Heap-based Buffer Overflow", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-122 Heap-based Buffer Overflow", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938", refsource: "CONFIRM", url: "https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938", }, { name: "https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264", refsource: "MISC", url: "https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264", }, { name: "FEDORA-2022-a3d70b50f0", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/", }, { name: "[oss-security] 20220114 Re: 3 new CVE's in vim", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2022/01/15/1", }, { name: "FEDORA-2022-48b86d586f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/", }, { name: "https://support.apple.com/kb/HT213183", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT213183", }, { name: "20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2022/Mar/29", }, { name: "https://support.apple.com/kb/HT213256", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT213256", }, { name: "20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2022/May/35", }, { name: "https://support.apple.com/kb/HT213343", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT213343", }, { name: "20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2022/Jul/14", }, { name: "GLSA-202208-32", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202208-32", }, ], }, source: { advisory: "5c6b93c1-2d27-4e98-a931-147877b8c938", discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "c09c270a-b464-47c1-9133-acb35b22c19a", assignerShortName: "@huntrdev", cveId: "CVE-2021-4136", datePublished: "2021-12-19T17:00:10", dateReserved: "2021-12-18T00:00:00", dateUpdated: "2024-08-03T17:16:04.242Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"8.2.3847\", \"matchCriteriaId\": \"F0EE9D8B-46E1-4074-B967-8781DEC48FBC\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A930E247-0B43-43CB-98FF-6CE7B8189835\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.15\", \"versionEndExcluding\": \"10.15.7\", \"matchCriteriaId\": \"DB8A73F8-3074-4B32-B9F6-343B6B1988C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"A654B8A2-FC30-4171-B0BB-366CD7ED4B6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*\", \"matchCriteriaId\": \"F12CC8B5-C1EB-419E-8496-B9A3864656AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1F4BF7F-90D4-4668-B4E6-B06F4070F448\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*\", \"matchCriteriaId\": \"7FD7176C-F4D1-43A7-9E49-BA92CA0D9980\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*\", \"matchCriteriaId\": \"2703DE0B-8A9E-4A9D-9AE8-028E22BF47CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F441A43-1669-478D-9EC8-E96882DE4F9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*\", \"matchCriteriaId\": \"D425C653-37A2-448C-BF2F-B684ADB08A26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*\", \"matchCriteriaId\": \"A54D63B7-B92B-47C3-B1C5-9892E5873A98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*\", \"matchCriteriaId\": \"012052B5-9AA7-4FD3-9C80-5F615330039D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*\", \"matchCriteriaId\": \"50F21A3C-0AC3-48C5-A4F8-5A7B478875B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E974DC6-F7D9-4389-9AF9-863F6E419CE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*\", \"matchCriteriaId\": \"156A6382-2BD3-4882-90B2-8E7CF6659E17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*\", \"matchCriteriaId\": \"20A2FDB2-6712-406A-9896-C0B44508B07D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*\", \"matchCriteriaId\": \"49F537A0-DC42-4176-B22F-C80D179DD99D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-004:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E463183-7E29-464F-B459-F3E1D62501FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1C795B9-E58D-467C-83A8-2D45C792292F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11.0\", \"versionEndExcluding\": \"11.6.6\", \"matchCriteriaId\": \"09A6345C-D813-43BA-B12E-789C80653F86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.0\", \"versionEndExcluding\": \"12.3\", \"matchCriteriaId\": \"9C72309C-939F-4744-80DB-07C4452BDAFE\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"vim is vulnerable to Heap-based Buffer Overflow\"}, {\"lang\": \"es\", \"value\": \"vim es vulnerable al desbordamiento del b\\u00fafer en la regi\\u00f3n Heap de la memoria\"}]", id: "CVE-2021-4136", lastModified: "2024-11-21T06:36:58.833", metrics: "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV30\": [{\"source\": \"security@huntr.dev\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.5}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", published: "2021-12-19T17:15:07.553", references: "[{\"url\": \"http://seclists.org/fulldisclosure/2022/Jul/14\", \"source\": \"security@huntr.dev\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Mar/29\", \"source\": \"security@huntr.dev\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/May/35\", \"source\": \"security@huntr.dev\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/01/15/1\", \"source\": \"security@huntr.dev\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264\", \"source\": \"security@huntr.dev\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938\", \"source\": \"security@huntr.dev\", \"tags\": [\"Exploit\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/\", \"source\": \"security@huntr.dev\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/\", \"source\": \"security@huntr.dev\"}, {\"url\": \"https://security.gentoo.org/glsa/202208-32\", \"source\": \"security@huntr.dev\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213183\", \"source\": \"security@huntr.dev\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213256\", \"source\": \"security@huntr.dev\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213343\", \"source\": \"security@huntr.dev\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Jul/14\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Mar/29\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/May/35\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/01/15/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/202208-32\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213183\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213256\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213343\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", sourceIdentifier: "security@huntr.dev", vulnStatus: "Modified", weaknesses: "[{\"source\": \"security@huntr.dev\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-122\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2021-4136\",\"sourceIdentifier\":\"security@huntr.dev\",\"published\":\"2021-12-19T17:15:07.553\",\"lastModified\":\"2024-11-21T06:36:58.833\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"vim is vulnerable to Heap-based Buffer Overflow\"},{\"lang\":\"es\",\"value\":\"vim es vulnerable al desbordamiento del búfer en la región Heap de la memoria\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":5.5}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"security@huntr.dev\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-122\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2.3847\",\"matchCriteriaId\":\"F0EE9D8B-46E1-4074-B967-8781DEC48FBC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.15\",\"versionEndExcluding\":\"10.15.7\",\"matchCriteriaId\":\"DB8A73F8-3074-4B32-B9F6-343B6B1988C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"A654B8A2-FC30-4171-B0BB-366CD7ED4B6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*\",\"matchCriteriaId\":\"F12CC8B5-C1EB-419E-8496-B9A3864656AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1F4BF7F-90D4-4668-B4E6-B06F4070F448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FD7176C-F4D1-43A7-9E49-BA92CA0D9980\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*\",\"matchCriteriaId\":\"2703DE0B-8A9E-4A9D-9AE8-028E22BF47CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F441A43-1669-478D-9EC8-E96882DE4F9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*\",\"matchCriteriaId\":\"D425C653-37A2-448C-BF2F-B684ADB08A26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*\",\"matchCriteriaId\":\"A54D63B7-B92B-47C3-B1C5-9892E5873A98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*\",\"matchCriteriaId\":\"012052B5-9AA7-4FD3-9C80-5F615330039D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*\",\"matchCriteriaId\":\"50F21A3C-0AC3-48C5-A4F8-5A7B478875B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E974DC6-F7D9-4389-9AF9-863F6E419CE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*\",\"matchCriteriaId\":\"156A6382-2BD3-4882-90B2-8E7CF6659E17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*\",\"matchCriteriaId\":\"20A2FDB2-6712-406A-9896-C0B44508B07D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*\",\"matchCriteriaId\":\"49F537A0-DC42-4176-B22F-C80D179DD99D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-004:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E463183-7E29-464F-B459-F3E1D62501FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1C795B9-E58D-467C-83A8-2D45C792292F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0\",\"versionEndExcluding\":\"11.6.6\",\"matchCriteriaId\":\"09A6345C-D813-43BA-B12E-789C80653F86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0\",\"versionEndExcluding\":\"12.3\",\"matchCriteriaId\":\"9C72309C-939F-4744-80DB-07C4452BDAFE\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/fulldisclosure/2022/Jul/14\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Mar/29\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/May/35\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/01/15/1\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264\",\"source\":\"security@huntr.dev\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938\",\"source\":\"security@huntr.dev\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/\",\"source\":\"security@huntr.dev\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/\",\"source\":\"security@huntr.dev\"},{\"url\":\"https://security.gentoo.org/glsa/202208-32\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213183\",\"source\":\"security@huntr.dev\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213256\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213343\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Jul/14\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Mar/29\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/May/35\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/01/15/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202208-32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213256\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213343\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
suse-su-2022:4619-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for vim", title: "Title of the patch", }, { category: "description", text: "This update for vim fixes the following issues:\n\nUpdated to version 9.0.0814:\n\n * Fixing bsc#1192478 VUL-1: CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow\n * Fixing bsc#1203508 VUL-0: CVE-2022-3234: vim: Heap-based Buffer Overflow prior to 9.0.0483.\n * Fixing bsc#1203509 VUL-1: CVE-2022-3235: vim: Use After Free in GitHub prior to 9.0.0490.\n * Fixing bsc#1203820 VUL-0: CVE-2022-3324: vim: Stack-based Buffer Overflow in prior to 9.0.0598.\n * Fixing bsc#1204779 VUL-0: CVE-2022-3705: vim: use after free in function qf_update_buffer of the file quickfix.c\n * Fixing bsc#1203152 VUL-1: CVE-2022-2982: vim: use after free in qf_fill_buffer()\n * Fixing bsc#1203796 VUL-1: CVE-2022-3296: vim: stack out of bounds read in ex_finally() in ex_eval.c\n * Fixing bsc#1203797 VUL-1: CVE-2022-3297: vim: use-after-free in process_next_cpt_value() at insexpand.c\n * Fixing bsc#1203110 VUL-1: CVE-2022-3099: vim: Use After Free in ex_docmd.c\n * Fixing bsc#1203194 VUL-1: CVE-2022-3134: vim: use after free in do_tag()\n * Fixing bsc#1203272 VUL-1: CVE-2022-3153: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.\n * Fixing bsc#1203799 VUL-1: CVE-2022-3278: vim: NULL pointer dereference in eval_next_non_blank() in eval.c\n * Fixing bsc#1203924 VUL-1: CVE-2022-3352: vim: vim: use after free\n * Fixing bsc#1203155 VUL-1: CVE-2022-2980: vim: null pointer dereference in do_mouse()\n * Fixing bsc#1202962 VUL-1: CVE-2022-3037: vim: Use After Free in vim prior to 9.0.0321\n * Fixing bsc#1200884 Vim: Error on startup\n * Fixing bsc#1200902 VUL-0: CVE-2022-2183: vim: Out-of-bounds Read through get_lisp_indent() Mon 13:32\n * Fixing bsc#1200903 VUL-0: CVE-2022-2182: vim: Heap-based Buffer Overflow through parse_cmd_address() Tue 08:37\n * Fixing bsc#1200904 VUL-0: CVE-2022-2175: vim: Buffer Over-read through cmdline_insert_reg() Tue 08:37\n * Fixing bsc#1201249 VUL-0: CVE-2022-2304: vim: stack buffer overflow in spell_dump_compl()\n * Fixing bsc#1201356 VUL-1: CVE-2022-2343: vim: Heap-based Buffer Overflow in GitHub repository vim prior to 9.0.0044\n * Fixing bsc#1201359 VUL-1: CVE-2022-2344: vim: Another Heap-based Buffer Overflow vim prior to 9.0.0045\n * Fixing bsc#1201363 VUL-1: CVE-2022-2345: vim: Use After Free in GitHub repository vim prior to 9.0.0046.\n * Fixing bsc#1201620 vim: SLE-15-SP4-Full-x86_64-GM-Media1 and vim-plugin-tlib-1.27-bp154.2.18.noarch issue\n * Fixing bsc#1202414 VUL-1: CVE-2022-2819: vim: Heap-based Buffer Overflow in compile_lock_unlock()\n * Fixing bsc#1202552 VUL-1: CVE-2022-2874: vim: NULL Pointer Dereference in generate_loadvar()\n * Fixing bsc#1200270 VUL-1: CVE-2022-1968: vim: use after free in utf_ptr2char\n * Fixing bsc#1200697 VUL-1: CVE-2022-2124: vim: out of bounds read in current_quote()\n * Fixing bsc#1200698 VUL-1: CVE-2022-2125: vim: out of bounds read in get_lisp_indent()\n * Fixing bsc#1200700 VUL-1: CVE-2022-2126: vim: out of bounds read in suggest_trie_walk()\n * Fixing bsc#1200701 VUL-1: CVE-2022-2129: vim: out of bounds write in vim_regsub_both()\n * Fixing bsc#1200732 VUL-1: CVE-2022-1720: vim: out of bounds read in grab_file_name()\n * Fixing bsc#1201132 VUL-1: CVE-2022-2264: vim: out of bounds read in inc()\n * Fixing bsc#1201133 VUL-1: CVE-2022-2284: vim: out of bounds read in utfc_ptr2len()\n * Fixing bsc#1201134 VUL-1: CVE-2022-2285: vim: negative size passed to memmove() due to integer overflow\n * Fixing bsc#1201135 VUL-1: CVE-2022-2286: vim: out of bounds read in ins_bytes()\n * Fixing bsc#1201136 VUL-1: CVE-2022-2287: vim: out of bounds read in suggest_trie_walk()\n * Fixing bsc#1201150 VUL-1: CVE-2022-2231: vim: null pointer dereference skipwhite()\n * Fixing bsc#1201151 VUL-1: CVE-2022-2210: vim: out of bounds read in ml_append_int()\n * Fixing bsc#1201152 VUL-1: CVE-2022-2208: vim: null pointer dereference in diff_check()\n * Fixing bsc#1201153 VUL-1: CVE-2022-2207: vim: out of bounds read in ins_bs()\n * Fixing bsc#1201154 VUL-1: CVE-2022-2257: vim: out of bounds read in msg_outtrans_special()\n * Fixing bsc#1201155 VUL-1: CVE-2022-2206: vim: out of bounds read in msg_outtrans_attr()\n * Fixing bsc#1201863 VUL-1: CVE-2022-2522: vim: out of bounds read via nested autocommand\n * Fixing bsc#1202046 VUL-1: CVE-2022-2571: vim: Heap-based Buffer Overflow related to ins_comp_get_next_word_or_line()\n * Fixing bsc#1202049 VUL-1: CVE-2022-2580: vim: Heap-based Buffer Overflow related to eval_string()\n * Fixing bsc#1202050 VUL-1: CVE-2022-2581: vim: Out-of-bounds Read related to cstrchr()\n * Fixing bsc#1202051 VUL-1: CVE-2022-2598: vim: Undefined Behavior for Input to API related to diff_mark_adjust_tp() and ex_diffgetput()\n * Fixing bsc#1202420 VUL-1: CVE-2022-2817: vim: Use After Free in f_assert_fails()\n * Fixing bsc#1202421 VUL-1: CVE-2022-2816: vim: Out-of-bounds Read in check_vim9_unlet()\n * Fixing bsc#1202511 VUL-1: CVE-2022-2862: vim: use-after-free in compile_nested_function()\n * Fixing bsc#1202512 VUL-1: CVE-2022-2849: vim: Invalid memory access related to mb_ptr2len()\n * Fixing bsc#1202515 VUL-1: CVE-2022-2845: vim: Buffer Over-read related to display_dollar()\n * Fixing bsc#1202599 VUL-1: CVE-2022-2889: vim: use-after-free in find_var_also_in_script() in evalvars.c\n * Fixing bsc#1202687 VUL-1: CVE-2022-2923: vim: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240\n * Fixing bsc#1202689 VUL-1: CVE-2022-2946: vim: use after free in function vim_vsnprintf_typval\n * Fixing bsc#1202862 VUL-1: CVE-2022-3016: vim: Use After Free in vim prior to 9.0.0285 Mon 12:00\n * Fixing bsc#1191770 VUL-0: CVE-2021-3875: vim: heap-based buffer overflow \n * Fixing bsc#1192167 VUL-0: CVE-2021-3903: vim: heap-based buffer overflow \n * Fixing bsc#1192902 VUL-0: CVE-2021-3968: vim: vim is vulnerable to \n Heap-based Buffer Overflow \n * Fixing bsc#1192903 VUL-0: CVE-2021-3973: vim: vim is vulnerable to \n Heap-based Buffer Overflow \n * Fixing bsc#1192904 VUL-0: CVE-2021-3974: vim: vim is vulnerable to Use\n After Free \n * Fixing bsc#1193466 VUL-1: CVE-2021-4069: vim: use-after-free in ex_open()\n in src/ex_docmd.c \n * Fixing bsc#1193905 VUL-0: CVE-2021-4136: vim: vim is vulnerable to\n Heap-based Buffer Overflow \n * Fixing bsc#1194093 VUL-1: CVE-2021-4166: vim: vim is vulnerable to\n Out-of-bounds Read \n * Fixing bsc#1194216 VUL-1: CVE-2021-4193: vim: vulnerable to \n Out-of-bounds Read \n * Fixing bsc#1194217 VUL-0: CVE-2021-4192: vim: vulnerable to Use After Free\n * Fixing bsc#1194872 VUL-0: CVE-2022-0261: vim: Heap-based Buffer Overflow\n in vim prior to 8.2. \n * Fixing bsc#1194885 VUL-0: CVE-2022-0213: vim: vim is vulnerable to\n Heap-based Buffer Overflow \n * Fixing bsc#1195004 VUL-0: CVE-2022-0318: vim: Heap-based Buffer Overflow in\n vim prior to 8.2. \n * Fixing bsc#1195203 VUL-0: CVE-2022-0359: vim: heap-based buffer overflow in\n init_ccline() in ex_getln.c \n * Fixing bsc#1195354 VUL-0: CVE-2022-0407: vim: Heap-based Buffer Overflow in\n Conda vim prior to 8.2. \n * Fixing bsc#1198596 VUL-0: CVE-2022-1381: vim: global heap buffer overflow\n in skip_range \n * Fixing bsc#1199331 VUL-0: CVE-2022-1616: vim: Use after free in\n append_command \n * Fixing bsc#1199333 VUL-0: CVE-2022-1619: vim: Heap-based Buffer Overflow in\n function cmdline_erase_chars \n * Fixing bsc#1199334 VUL-0: CVE-2022-1620: vim: NULL Pointer Dereference in\n function vim_regexec_string \n * Fixing bsc#1199747 VUL-0: CVE-2022-1796: vim: Use After in\n find_pattern_in_path \n * Fixing bsc#1200010 VUL-0: CVE-2022-1897: vim: Out-of-bounds Write in vim \n * Fixing bsc#1200011 VUL-0: CVE-2022-1898: vim: Use After Free in vim prior\n to 8.2 \n * Fixing bsc#1200012 VUL-0: CVE-2022-1927: vim: Buffer Over-read in vim prior\n to 8.2 \n * Fixing bsc#1070955 VUL-1: CVE-2017-17087: vim: Sets the group ownership of a\n .swp file to the editor's primary group, which allows local users to obtain\n sensitive information \n * Fixing bsc#1194388 VUL-1: CVE-2022-0128: vim: vim is vulnerable to\n Out-of-bounds Read \n * Fixing bsc#1195332 VUL-1: CVE-2022-0392: vim: Heap-based Buffer Overflow\n in vim prior to 8.2 \n * Fixing bsc#1196361 VUL-1: CVE-2022-0696: vim: NULL Pointer Dereference in\n vim prior to 8.2 \n * Fixing bsc#1198748 VUL-1: CVE-2022-1420: vim: Out-of-range Pointer Offset \n * Fixing bsc#1199651 VUL-1: CVE-2022-1735: vim: heap buffer overflow \n * Fixing bsc#1199655 VUL-1: CVE-2022-1733: vim: Heap-based Buffer Overflow in\n cindent.c \n * Fixing bsc#1199693 VUL-1: CVE-2022-1771: vim: stack exhaustion in vim prior\n to 8.2. \n * Fixing bsc#1199745 VUL-1: CVE-2022-1785: vim: Out-of-bounds Write \n * Fixing bsc#1199936 VUL-1: CVE-2022-1851: vim: out of bounds read \n * Fixing bsc#1195004 - (CVE-2022-0318) VUL-0: CVE-2022-0318: vim: Heap-based Buffer Overflow in vim prior to 8.2.\n * Fixing bsc#1190570 CVE-2021-3796: vim: use-after-free in nv_replace() in normal.c\n * Fixing bsc#1191893 CVE-2021-3872: vim: heap-based buffer overflow in win_redr_status() drawscreen.c\n * Fixing bsc#1192481 CVE-2021-3927: vim: vim is vulnerable to Heap-based Buffer Overflow\n * Fixing bsc#1192478 CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow\n * Fixing bsc#1193294 CVE-2021-4019: vim: vim is vulnerable to Heap-based Buffer Overflow\n * Fixing bsc#1193298 CVE-2021-3984: vim: illegal memory access when C-indenting could lead to Heap Buffer Overflow\n * Fixing bsc#1190533 CVE-2021-3778: vim: Heap-based Buffer Overflow in regexp_nfa.c\n * Fixing bsc#1194216 CVE-2021-4193: vim: vulnerable to Out-of-bounds Read\n * Fixing bsc#1194556 CVE-2021-46059: vim: A Pointer Dereference vulnerability \n exists in Vim 8.2.3883 via the vim_regexec_multi function at regexp.c, which causes a denial of service. \n * Fixing bsc#1195066 CVE-2022-0319: vim: Out-of-bounds Read in vim/vim prior to 8.2.\n * Fixing bsc#1195126 CVE-2022-0351: vim: uncontrolled recursion in eval7()\n * Fixing bsc#1195202 CVE-2022-0361: vim: Heap-based Buffer Overflow in vim prior to 8.2.\n * Fixing bsc#1195356 CVE-2022-0413: vim: use after free in src/ex_cmds.c\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-4619,SUSE-OpenStack-Cloud-9-2022-4619,SUSE-OpenStack-Cloud-Crowbar-9-2022-4619,SUSE-SLE-SAP-12-SP4-2022-4619,SUSE-SLE-SERVER-12-SP2-BCL-2022-4619,SUSE-SLE-SERVER-12-SP3-BCL-2022-4619,SUSE-SLE-SERVER-12-SP4-LTSS-2022-4619,SUSE-SLE-SERVER-12-SP5-2022-4619", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_4619-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:4619-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20224619-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:4619-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html", }, { category: "self", summary: "SUSE Bug 1070955", url: "https://bugzilla.suse.com/1070955", }, { category: "self", summary: "SUSE Bug 1173256", url: "https://bugzilla.suse.com/1173256", }, { category: "self", summary: "SUSE Bug 1174564", url: "https://bugzilla.suse.com/1174564", }, { category: "self", summary: "SUSE Bug 1176549", url: "https://bugzilla.suse.com/1176549", }, { category: "self", summary: "SUSE Bug 1182324", url: "https://bugzilla.suse.com/1182324", }, { category: "self", summary: "SUSE Bug 1190533", url: "https://bugzilla.suse.com/1190533", }, { category: "self", summary: "SUSE Bug 1190570", url: "https://bugzilla.suse.com/1190570", }, { category: "self", summary: "SUSE Bug 1191770", url: "https://bugzilla.suse.com/1191770", }, { category: "self", summary: "SUSE Bug 1191893", url: "https://bugzilla.suse.com/1191893", }, { category: "self", summary: "SUSE Bug 1192167", url: "https://bugzilla.suse.com/1192167", }, { category: "self", summary: "SUSE Bug 1192478", url: "https://bugzilla.suse.com/1192478", }, { category: "self", summary: "SUSE Bug 1192481", url: "https://bugzilla.suse.com/1192481", }, { category: "self", summary: "SUSE Bug 1192902", url: "https://bugzilla.suse.com/1192902", }, { category: "self", summary: "SUSE Bug 1192903", url: "https://bugzilla.suse.com/1192903", }, { category: "self", summary: "SUSE Bug 1192904", url: "https://bugzilla.suse.com/1192904", }, { category: "self", summary: "SUSE Bug 1193294", url: "https://bugzilla.suse.com/1193294", }, { category: "self", summary: "SUSE Bug 1193298", url: "https://bugzilla.suse.com/1193298", }, { category: "self", summary: "SUSE Bug 1193466", url: "https://bugzilla.suse.com/1193466", }, { category: "self", summary: "SUSE Bug 1193905", url: "https://bugzilla.suse.com/1193905", }, { category: "self", summary: "SUSE Bug 1194093", url: "https://bugzilla.suse.com/1194093", }, { category: "self", summary: "SUSE Bug 1194216", url: "https://bugzilla.suse.com/1194216", }, { category: "self", summary: "SUSE Bug 1194217", url: "https://bugzilla.suse.com/1194217", }, { category: "self", summary: "SUSE Bug 1194388", url: "https://bugzilla.suse.com/1194388", }, { category: "self", summary: "SUSE Bug 1194556", url: "https://bugzilla.suse.com/1194556", }, { category: "self", summary: "SUSE Bug 1194872", url: "https://bugzilla.suse.com/1194872", }, { category: "self", summary: "SUSE Bug 1194885", url: "https://bugzilla.suse.com/1194885", }, { category: "self", summary: "SUSE Bug 1195004", url: "https://bugzilla.suse.com/1195004", }, { category: "self", summary: "SUSE Bug 1195066", url: "https://bugzilla.suse.com/1195066", }, { category: "self", summary: "SUSE Bug 1195126", url: "https://bugzilla.suse.com/1195126", }, { category: "self", summary: "SUSE Bug 1195202", url: "https://bugzilla.suse.com/1195202", }, { category: "self", summary: "SUSE Bug 1195203", url: "https://bugzilla.suse.com/1195203", }, { category: "self", summary: "SUSE Bug 1195332", url: "https://bugzilla.suse.com/1195332", }, { category: "self", summary: "SUSE Bug 1195354", url: "https://bugzilla.suse.com/1195354", }, { category: "self", summary: "SUSE Bug 1195356", url: "https://bugzilla.suse.com/1195356", }, { category: "self", summary: "SUSE Bug 1196361", url: "https://bugzilla.suse.com/1196361", }, { category: "self", summary: "SUSE Bug 1198596", url: "https://bugzilla.suse.com/1198596", }, { category: "self", summary: "SUSE Bug 1198748", url: "https://bugzilla.suse.com/1198748", }, { category: "self", summary: "SUSE Bug 1199331", url: "https://bugzilla.suse.com/1199331", }, { category: "self", summary: "SUSE Bug 1199333", url: "https://bugzilla.suse.com/1199333", }, { category: "self", summary: "SUSE Bug 1199334", url: "https://bugzilla.suse.com/1199334", }, { category: "self", summary: "SUSE Bug 1199651", url: "https://bugzilla.suse.com/1199651", }, { category: "self", summary: "SUSE Bug 1199655", url: "https://bugzilla.suse.com/1199655", }, { category: "self", summary: "SUSE Bug 1199693", url: "https://bugzilla.suse.com/1199693", }, { category: "self", summary: "SUSE Bug 1199745", url: "https://bugzilla.suse.com/1199745", }, { category: "self", summary: "SUSE Bug 1199747", url: "https://bugzilla.suse.com/1199747", }, { category: "self", summary: "SUSE Bug 1199936", url: "https://bugzilla.suse.com/1199936", }, { category: "self", summary: "SUSE Bug 1200010", url: "https://bugzilla.suse.com/1200010", }, { category: "self", summary: "SUSE Bug 1200011", url: "https://bugzilla.suse.com/1200011", }, { category: "self", summary: "SUSE Bug 1200012", url: "https://bugzilla.suse.com/1200012", }, { category: "self", summary: "SUSE Bug 1200270", url: "https://bugzilla.suse.com/1200270", }, { category: "self", summary: "SUSE Bug 1200697", url: "https://bugzilla.suse.com/1200697", }, { category: "self", summary: "SUSE Bug 1200698", url: "https://bugzilla.suse.com/1200698", }, { category: "self", summary: "SUSE Bug 1200700", url: "https://bugzilla.suse.com/1200700", }, { category: "self", summary: "SUSE Bug 1200701", url: "https://bugzilla.suse.com/1200701", }, { category: "self", summary: "SUSE Bug 1200732", url: "https://bugzilla.suse.com/1200732", }, { category: "self", summary: "SUSE Bug 1200884", url: "https://bugzilla.suse.com/1200884", }, { category: "self", summary: "SUSE Bug 1200902", url: "https://bugzilla.suse.com/1200902", }, { category: "self", summary: "SUSE Bug 1200903", url: "https://bugzilla.suse.com/1200903", }, { category: "self", summary: "SUSE Bug 1200904", url: "https://bugzilla.suse.com/1200904", }, { category: "self", summary: "SUSE Bug 1201132", url: "https://bugzilla.suse.com/1201132", }, { category: "self", summary: "SUSE Bug 1201133", url: "https://bugzilla.suse.com/1201133", }, { category: "self", summary: "SUSE Bug 1201134", url: "https://bugzilla.suse.com/1201134", }, { category: "self", summary: "SUSE Bug 1201135", url: "https://bugzilla.suse.com/1201135", }, { category: "self", summary: "SUSE Bug 1201136", url: "https://bugzilla.suse.com/1201136", }, { category: "self", summary: "SUSE Bug 1201150", url: "https://bugzilla.suse.com/1201150", }, { category: "self", summary: "SUSE Bug 1201151", url: "https://bugzilla.suse.com/1201151", }, { category: "self", summary: "SUSE Bug 1201152", url: "https://bugzilla.suse.com/1201152", }, { category: "self", summary: "SUSE Bug 1201153", url: "https://bugzilla.suse.com/1201153", }, { category: "self", summary: "SUSE Bug 1201154", url: "https://bugzilla.suse.com/1201154", }, { category: "self", summary: "SUSE Bug 1201155", url: "https://bugzilla.suse.com/1201155", }, { category: "self", summary: "SUSE Bug 1201249", url: "https://bugzilla.suse.com/1201249", }, { category: "self", summary: "SUSE Bug 1201356", url: "https://bugzilla.suse.com/1201356", }, { category: "self", summary: "SUSE Bug 1201359", url: "https://bugzilla.suse.com/1201359", }, { category: "self", summary: "SUSE Bug 1201363", url: "https://bugzilla.suse.com/1201363", }, { category: "self", summary: "SUSE Bug 1201620", url: "https://bugzilla.suse.com/1201620", }, { category: "self", summary: "SUSE Bug 1201863", url: "https://bugzilla.suse.com/1201863", }, { category: "self", summary: "SUSE Bug 1202046", url: "https://bugzilla.suse.com/1202046", }, { category: "self", summary: "SUSE Bug 1202049", url: "https://bugzilla.suse.com/1202049", }, { category: "self", summary: "SUSE Bug 1202050", url: "https://bugzilla.suse.com/1202050", }, { category: "self", summary: "SUSE Bug 1202051", url: "https://bugzilla.suse.com/1202051", }, { category: "self", summary: "SUSE Bug 1202414", url: "https://bugzilla.suse.com/1202414", }, { category: "self", summary: "SUSE Bug 1202420", url: "https://bugzilla.suse.com/1202420", }, { category: "self", summary: "SUSE Bug 1202421", url: "https://bugzilla.suse.com/1202421", }, { category: "self", summary: "SUSE Bug 1202511", url: "https://bugzilla.suse.com/1202511", }, { category: "self", summary: "SUSE Bug 1202512", url: "https://bugzilla.suse.com/1202512", }, { category: "self", summary: "SUSE Bug 1202515", url: "https://bugzilla.suse.com/1202515", }, { category: "self", summary: "SUSE Bug 1202552", url: "https://bugzilla.suse.com/1202552", }, { category: "self", summary: "SUSE Bug 1202599", url: "https://bugzilla.suse.com/1202599", }, { category: "self", summary: "SUSE Bug 1202687", url: "https://bugzilla.suse.com/1202687", }, { category: "self", summary: "SUSE Bug 1202689", url: "https://bugzilla.suse.com/1202689", }, { category: "self", summary: "SUSE Bug 1202862", url: "https://bugzilla.suse.com/1202862", }, { category: "self", summary: "SUSE Bug 1202962", url: "https://bugzilla.suse.com/1202962", }, { category: "self", summary: "SUSE Bug 1203110", url: "https://bugzilla.suse.com/1203110", }, { category: "self", summary: "SUSE Bug 1203152", url: "https://bugzilla.suse.com/1203152", }, { category: "self", summary: "SUSE Bug 1203155", url: "https://bugzilla.suse.com/1203155", }, { category: "self", summary: "SUSE Bug 1203194", url: "https://bugzilla.suse.com/1203194", }, { category: "self", summary: "SUSE Bug 1203272", url: "https://bugzilla.suse.com/1203272", }, { category: "self", summary: "SUSE Bug 1203508", url: "https://bugzilla.suse.com/1203508", }, { category: "self", summary: "SUSE Bug 1203509", url: "https://bugzilla.suse.com/1203509", }, { category: "self", summary: "SUSE Bug 1203796", url: "https://bugzilla.suse.com/1203796", }, { category: "self", summary: "SUSE Bug 1203797", url: "https://bugzilla.suse.com/1203797", }, { category: "self", summary: "SUSE Bug 1203799", url: "https://bugzilla.suse.com/1203799", }, { category: "self", summary: "SUSE Bug 1203820", url: "https://bugzilla.suse.com/1203820", }, { category: "self", summary: "SUSE Bug 1203924", url: "https://bugzilla.suse.com/1203924", }, { category: "self", summary: "SUSE Bug 1204779", url: "https://bugzilla.suse.com/1204779", }, { category: "self", summary: "SUSE CVE CVE-2009-0316 page", url: "https://www.suse.com/security/cve/CVE-2009-0316/", }, { category: "self", summary: "SUSE CVE CVE-2016-1248 page", url: "https://www.suse.com/security/cve/CVE-2016-1248/", }, { category: "self", summary: "SUSE CVE CVE-2017-17087 page", url: "https://www.suse.com/security/cve/CVE-2017-17087/", }, { category: "self", summary: "SUSE CVE CVE-2017-5953 page", url: "https://www.suse.com/security/cve/CVE-2017-5953/", }, { category: "self", summary: "SUSE CVE CVE-2017-6349 page", url: "https://www.suse.com/security/cve/CVE-2017-6349/", }, { category: "self", summary: "SUSE CVE CVE-2017-6350 page", url: "https://www.suse.com/security/cve/CVE-2017-6350/", }, { category: "self", summary: "SUSE CVE CVE-2021-3778 page", url: "https://www.suse.com/security/cve/CVE-2021-3778/", }, { category: "self", summary: "SUSE CVE CVE-2021-3796 page", url: "https://www.suse.com/security/cve/CVE-2021-3796/", }, { category: "self", summary: "SUSE CVE CVE-2021-3872 page", url: "https://www.suse.com/security/cve/CVE-2021-3872/", }, { category: "self", summary: "SUSE CVE CVE-2021-3875 page", url: "https://www.suse.com/security/cve/CVE-2021-3875/", }, { category: "self", summary: "SUSE CVE CVE-2021-3903 page", url: "https://www.suse.com/security/cve/CVE-2021-3903/", }, { category: "self", summary: "SUSE CVE CVE-2021-3927 page", url: "https://www.suse.com/security/cve/CVE-2021-3927/", }, { category: "self", summary: "SUSE CVE CVE-2021-3928 page", url: "https://www.suse.com/security/cve/CVE-2021-3928/", }, { category: "self", summary: "SUSE CVE CVE-2021-3968 page", url: "https://www.suse.com/security/cve/CVE-2021-3968/", }, { category: "self", summary: "SUSE CVE CVE-2021-3973 page", url: "https://www.suse.com/security/cve/CVE-2021-3973/", }, { category: "self", summary: "SUSE CVE CVE-2021-3974 page", url: "https://www.suse.com/security/cve/CVE-2021-3974/", }, { category: "self", summary: "SUSE CVE CVE-2021-3984 page", url: "https://www.suse.com/security/cve/CVE-2021-3984/", }, { category: "self", summary: "SUSE CVE CVE-2021-4019 page", url: "https://www.suse.com/security/cve/CVE-2021-4019/", }, { category: "self", summary: "SUSE CVE CVE-2021-4069 page", url: "https://www.suse.com/security/cve/CVE-2021-4069/", }, { category: "self", summary: "SUSE CVE CVE-2021-4136 page", url: "https://www.suse.com/security/cve/CVE-2021-4136/", }, { category: "self", summary: "SUSE CVE CVE-2021-4166 page", url: "https://www.suse.com/security/cve/CVE-2021-4166/", }, { category: "self", summary: "SUSE CVE CVE-2021-4192 page", url: "https://www.suse.com/security/cve/CVE-2021-4192/", }, { category: "self", summary: "SUSE CVE CVE-2021-4193 page", url: "https://www.suse.com/security/cve/CVE-2021-4193/", }, { category: "self", summary: "SUSE CVE CVE-2021-46059 page", url: "https://www.suse.com/security/cve/CVE-2021-46059/", }, { category: "self", summary: "SUSE CVE CVE-2022-0128 page", url: "https://www.suse.com/security/cve/CVE-2022-0128/", }, { category: "self", summary: "SUSE CVE CVE-2022-0213 page", url: "https://www.suse.com/security/cve/CVE-2022-0213/", }, { category: "self", summary: "SUSE CVE CVE-2022-0261 page", url: "https://www.suse.com/security/cve/CVE-2022-0261/", }, { category: "self", summary: "SUSE CVE CVE-2022-0318 page", url: "https://www.suse.com/security/cve/CVE-2022-0318/", }, { category: "self", summary: "SUSE CVE CVE-2022-0319 page", url: "https://www.suse.com/security/cve/CVE-2022-0319/", }, { category: "self", summary: "SUSE CVE CVE-2022-0351 page", url: "https://www.suse.com/security/cve/CVE-2022-0351/", }, { category: "self", summary: "SUSE CVE CVE-2022-0359 page", url: "https://www.suse.com/security/cve/CVE-2022-0359/", }, { category: "self", summary: "SUSE CVE CVE-2022-0361 page", url: "https://www.suse.com/security/cve/CVE-2022-0361/", }, { category: "self", summary: "SUSE CVE CVE-2022-0392 page", url: "https://www.suse.com/security/cve/CVE-2022-0392/", }, { category: "self", summary: "SUSE CVE CVE-2022-0407 page", url: "https://www.suse.com/security/cve/CVE-2022-0407/", }, { category: "self", summary: "SUSE CVE CVE-2022-0413 page", url: "https://www.suse.com/security/cve/CVE-2022-0413/", }, { category: "self", summary: "SUSE CVE CVE-2022-0696 page", url: "https://www.suse.com/security/cve/CVE-2022-0696/", }, { category: "self", summary: "SUSE CVE CVE-2022-1381 page", url: "https://www.suse.com/security/cve/CVE-2022-1381/", }, { category: "self", summary: "SUSE CVE CVE-2022-1420 page", url: "https://www.suse.com/security/cve/CVE-2022-1420/", }, { category: "self", summary: "SUSE CVE CVE-2022-1616 page", url: "https://www.suse.com/security/cve/CVE-2022-1616/", }, { category: "self", summary: "SUSE CVE CVE-2022-1619 page", url: "https://www.suse.com/security/cve/CVE-2022-1619/", }, { category: "self", summary: "SUSE CVE CVE-2022-1620 page", url: "https://www.suse.com/security/cve/CVE-2022-1620/", }, { category: "self", summary: "SUSE CVE CVE-2022-1720 page", url: "https://www.suse.com/security/cve/CVE-2022-1720/", }, { category: "self", summary: "SUSE CVE CVE-2022-1733 page", url: "https://www.suse.com/security/cve/CVE-2022-1733/", }, { category: "self", summary: "SUSE CVE CVE-2022-1735 page", url: "https://www.suse.com/security/cve/CVE-2022-1735/", }, { category: "self", summary: "SUSE CVE CVE-2022-1771 page", url: "https://www.suse.com/security/cve/CVE-2022-1771/", }, { category: "self", summary: "SUSE CVE CVE-2022-1785 page", url: "https://www.suse.com/security/cve/CVE-2022-1785/", }, { category: "self", summary: "SUSE CVE CVE-2022-1796 page", url: "https://www.suse.com/security/cve/CVE-2022-1796/", }, { category: "self", summary: "SUSE CVE CVE-2022-1851 page", url: "https://www.suse.com/security/cve/CVE-2022-1851/", }, { category: "self", summary: "SUSE CVE CVE-2022-1897 page", url: "https://www.suse.com/security/cve/CVE-2022-1897/", }, { category: "self", summary: "SUSE CVE CVE-2022-1898 page", url: "https://www.suse.com/security/cve/CVE-2022-1898/", }, { category: "self", summary: "SUSE CVE CVE-2022-1927 page", url: "https://www.suse.com/security/cve/CVE-2022-1927/", }, { category: "self", summary: "SUSE CVE CVE-2022-1968 page", url: "https://www.suse.com/security/cve/CVE-2022-1968/", }, { category: "self", summary: "SUSE CVE CVE-2022-2124 page", url: "https://www.suse.com/security/cve/CVE-2022-2124/", }, { category: "self", summary: "SUSE CVE CVE-2022-2125 page", url: "https://www.suse.com/security/cve/CVE-2022-2125/", }, { category: "self", summary: "SUSE CVE CVE-2022-2126 page", url: "https://www.suse.com/security/cve/CVE-2022-2126/", }, { category: "self", summary: "SUSE CVE CVE-2022-2129 page", url: "https://www.suse.com/security/cve/CVE-2022-2129/", }, { category: "self", summary: "SUSE CVE CVE-2022-2175 page", url: "https://www.suse.com/security/cve/CVE-2022-2175/", }, { category: "self", summary: "SUSE CVE CVE-2022-2182 page", url: "https://www.suse.com/security/cve/CVE-2022-2182/", }, { category: "self", summary: "SUSE CVE CVE-2022-2183 page", url: "https://www.suse.com/security/cve/CVE-2022-2183/", }, { category: "self", summary: "SUSE CVE CVE-2022-2206 page", url: "https://www.suse.com/security/cve/CVE-2022-2206/", }, { category: "self", summary: "SUSE CVE CVE-2022-2207 page", url: "https://www.suse.com/security/cve/CVE-2022-2207/", }, { category: "self", summary: "SUSE CVE CVE-2022-2208 page", url: "https://www.suse.com/security/cve/CVE-2022-2208/", }, { category: "self", summary: "SUSE CVE CVE-2022-2210 page", url: "https://www.suse.com/security/cve/CVE-2022-2210/", }, { category: "self", summary: "SUSE CVE CVE-2022-2231 page", url: "https://www.suse.com/security/cve/CVE-2022-2231/", }, { category: "self", summary: "SUSE CVE CVE-2022-2257 page", url: "https://www.suse.com/security/cve/CVE-2022-2257/", }, { category: "self", summary: "SUSE CVE CVE-2022-2264 page", url: "https://www.suse.com/security/cve/CVE-2022-2264/", }, { category: "self", summary: "SUSE CVE CVE-2022-2284 page", url: "https://www.suse.com/security/cve/CVE-2022-2284/", }, { category: "self", summary: "SUSE CVE CVE-2022-2285 page", url: "https://www.suse.com/security/cve/CVE-2022-2285/", }, { category: "self", summary: "SUSE CVE CVE-2022-2286 page", url: "https://www.suse.com/security/cve/CVE-2022-2286/", }, { category: "self", summary: "SUSE CVE CVE-2022-2287 page", url: "https://www.suse.com/security/cve/CVE-2022-2287/", }, { category: "self", summary: "SUSE CVE CVE-2022-2304 page", url: "https://www.suse.com/security/cve/CVE-2022-2304/", }, { category: "self", summary: "SUSE CVE CVE-2022-2343 page", url: "https://www.suse.com/security/cve/CVE-2022-2343/", }, { category: "self", summary: "SUSE CVE CVE-2022-2344 page", url: "https://www.suse.com/security/cve/CVE-2022-2344/", }, { category: "self", summary: "SUSE CVE CVE-2022-2345 page", url: "https://www.suse.com/security/cve/CVE-2022-2345/", }, { category: "self", summary: "SUSE CVE CVE-2022-2522 page", url: "https://www.suse.com/security/cve/CVE-2022-2522/", }, { category: "self", summary: "SUSE CVE CVE-2022-2571 page", url: "https://www.suse.com/security/cve/CVE-2022-2571/", }, { category: "self", summary: "SUSE CVE CVE-2022-2580 page", url: "https://www.suse.com/security/cve/CVE-2022-2580/", }, { category: "self", summary: "SUSE CVE CVE-2022-2581 page", url: "https://www.suse.com/security/cve/CVE-2022-2581/", }, { category: "self", summary: "SUSE CVE CVE-2022-2598 page", url: "https://www.suse.com/security/cve/CVE-2022-2598/", }, { category: "self", summary: "SUSE CVE CVE-2022-2816 page", url: "https://www.suse.com/security/cve/CVE-2022-2816/", }, { category: "self", summary: "SUSE CVE CVE-2022-2817 page", url: "https://www.suse.com/security/cve/CVE-2022-2817/", }, { category: "self", summary: "SUSE CVE CVE-2022-2819 page", url: "https://www.suse.com/security/cve/CVE-2022-2819/", }, { category: "self", summary: "SUSE CVE CVE-2022-2845 page", url: "https://www.suse.com/security/cve/CVE-2022-2845/", }, { category: "self", summary: "SUSE CVE CVE-2022-2849 page", url: "https://www.suse.com/security/cve/CVE-2022-2849/", }, { category: "self", summary: "SUSE CVE CVE-2022-2862 page", url: "https://www.suse.com/security/cve/CVE-2022-2862/", }, { category: "self", summary: "SUSE CVE CVE-2022-2874 page", url: "https://www.suse.com/security/cve/CVE-2022-2874/", }, { category: "self", summary: "SUSE CVE CVE-2022-2889 page", url: "https://www.suse.com/security/cve/CVE-2022-2889/", }, { category: "self", summary: "SUSE CVE CVE-2022-2923 page", url: "https://www.suse.com/security/cve/CVE-2022-2923/", }, { category: "self", summary: "SUSE CVE CVE-2022-2946 page", url: "https://www.suse.com/security/cve/CVE-2022-2946/", }, { category: "self", summary: "SUSE CVE CVE-2022-2980 page", url: "https://www.suse.com/security/cve/CVE-2022-2980/", }, { category: "self", summary: "SUSE CVE CVE-2022-2982 page", url: "https://www.suse.com/security/cve/CVE-2022-2982/", }, { category: "self", summary: "SUSE CVE CVE-2022-3016 page", url: "https://www.suse.com/security/cve/CVE-2022-3016/", }, { category: "self", summary: "SUSE CVE CVE-2022-3037 page", url: "https://www.suse.com/security/cve/CVE-2022-3037/", }, { category: "self", summary: "SUSE CVE CVE-2022-3099 page", url: "https://www.suse.com/security/cve/CVE-2022-3099/", }, { category: "self", summary: "SUSE CVE CVE-2022-3134 page", url: "https://www.suse.com/security/cve/CVE-2022-3134/", }, { category: "self", summary: "SUSE CVE CVE-2022-3153 page", url: "https://www.suse.com/security/cve/CVE-2022-3153/", }, { category: "self", summary: "SUSE CVE CVE-2022-3234 page", url: "https://www.suse.com/security/cve/CVE-2022-3234/", }, { category: "self", summary: "SUSE CVE CVE-2022-3235 page", url: "https://www.suse.com/security/cve/CVE-2022-3235/", }, { category: "self", summary: "SUSE CVE CVE-2022-3278 page", url: "https://www.suse.com/security/cve/CVE-2022-3278/", }, { category: "self", summary: "SUSE CVE CVE-2022-3296 page", url: "https://www.suse.com/security/cve/CVE-2022-3296/", }, { category: "self", summary: "SUSE CVE CVE-2022-3297 page", url: "https://www.suse.com/security/cve/CVE-2022-3297/", }, { category: "self", summary: "SUSE CVE CVE-2022-3324 page", url: "https://www.suse.com/security/cve/CVE-2022-3324/", }, { category: "self", summary: "SUSE CVE CVE-2022-3352 page", url: "https://www.suse.com/security/cve/CVE-2022-3352/", }, { category: "self", summary: "SUSE CVE CVE-2022-3705 page", url: "https://www.suse.com/security/cve/CVE-2022-3705/", }, ], title: "Security update for vim", tracking: { current_release_date: "2022-12-27T04:16:45Z", generator: { date: "2022-12-27T04:16:45Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:4619-1", initial_release_date: "2022-12-27T04:16:45Z", revision_history: [ { date: "2022-12-27T04:16:45Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gvim-9.0.0814-17.9.1.aarch64", product: { name: "gvim-9.0.0814-17.9.1.aarch64", product_id: "gvim-9.0.0814-17.9.1.aarch64", }, }, { category: "product_version", name: "vim-9.0.0814-17.9.1.aarch64", product: { name: "vim-9.0.0814-17.9.1.aarch64", product_id: "vim-9.0.0814-17.9.1.aarch64", }, }, { category: "product_version", name: "vim-small-9.0.0814-17.9.1.aarch64", product: { name: "vim-small-9.0.0814-17.9.1.aarch64", product_id: "vim-small-9.0.0814-17.9.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "gvim-9.0.0814-17.9.1.i586", product: { name: "gvim-9.0.0814-17.9.1.i586", product_id: "gvim-9.0.0814-17.9.1.i586", }, }, { category: "product_version", name: "vim-9.0.0814-17.9.1.i586", product: { name: "vim-9.0.0814-17.9.1.i586", product_id: "vim-9.0.0814-17.9.1.i586", }, }, { category: "product_version", name: "vim-small-9.0.0814-17.9.1.i586", product: { name: "vim-small-9.0.0814-17.9.1.i586", product_id: "vim-small-9.0.0814-17.9.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "vim-data-9.0.0814-17.9.1.noarch", product: { name: "vim-data-9.0.0814-17.9.1.noarch", product_id: "vim-data-9.0.0814-17.9.1.noarch", }, }, { category: "product_version", name: "vim-data-common-9.0.0814-17.9.1.noarch", product: { name: "vim-data-common-9.0.0814-17.9.1.noarch", product_id: "vim-data-common-9.0.0814-17.9.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "gvim-9.0.0814-17.9.1.ppc64le", product: { name: "gvim-9.0.0814-17.9.1.ppc64le", product_id: "gvim-9.0.0814-17.9.1.ppc64le", }, }, { category: "product_version", name: "vim-9.0.0814-17.9.1.ppc64le", product: { name: "vim-9.0.0814-17.9.1.ppc64le", product_id: "vim-9.0.0814-17.9.1.ppc64le", }, }, { category: "product_version", name: "vim-small-9.0.0814-17.9.1.ppc64le", product: { name: "vim-small-9.0.0814-17.9.1.ppc64le", product_id: "vim-small-9.0.0814-17.9.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gvim-9.0.0814-17.9.1.s390x", product: { name: "gvim-9.0.0814-17.9.1.s390x", product_id: "gvim-9.0.0814-17.9.1.s390x", }, }, { category: "product_version", name: "vim-9.0.0814-17.9.1.s390x", product: { name: "vim-9.0.0814-17.9.1.s390x", product_id: "vim-9.0.0814-17.9.1.s390x", }, }, { category: "product_version", name: "vim-small-9.0.0814-17.9.1.s390x", product: { name: "vim-small-9.0.0814-17.9.1.s390x", product_id: "vim-small-9.0.0814-17.9.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gvim-9.0.0814-17.9.1.x86_64", product: { name: "gvim-9.0.0814-17.9.1.x86_64", product_id: "gvim-9.0.0814-17.9.1.x86_64", }, }, { category: "product_version", name: "vim-9.0.0814-17.9.1.x86_64", product: { name: "vim-9.0.0814-17.9.1.x86_64", product_id: "vim-9.0.0814-17.9.1.x86_64", }, }, { category: "product_version", name: "vim-small-9.0.0814-17.9.1.x86_64", product: { name: "vim-small-9.0.0814-17.9.1.x86_64", product_id: "vim-small-9.0.0814-17.9.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 9", product: { name: "SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:9", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 9", product: { name: "SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:9", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", }, product_reference: "gvim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", }, product_reference: "vim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", }, product_reference: "gvim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", }, product_reference: "gvim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", }, product_reference: "gvim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", }, product_reference: "vim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", }, product_reference: "vim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", }, product_reference: "vim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", }, product_reference: "gvim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", }, product_reference: "gvim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", }, product_reference: "gvim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", }, product_reference: "vim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", }, product_reference: "vim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", }, product_reference: "vim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", }, product_reference: "gvim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", }, product_reference: "gvim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", }, product_reference: "gvim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gvim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", }, product_reference: "gvim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", }, product_reference: "vim-9.0.0814-17.9.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", }, product_reference: "vim-9.0.0814-17.9.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", }, product_reference: "vim-9.0.0814-17.9.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-9.0.0814-17.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", }, product_reference: "vim-9.0.0814-17.9.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-data-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-9.0.0814-17.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", }, product_reference: "vim-data-common-9.0.0814-17.9.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2009-0316", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2009-0316", }, ], notes: [ { category: "general", text: "Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2009-0316", url: "https://www.suse.com/security/cve/CVE-2009-0316", }, { category: "external", summary: "SUSE Bug 470100 for CVE-2009-0316", url: "https://bugzilla.suse.com/470100", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2009-0316", }, { cve: "CVE-2016-1248", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1248", }, ], notes: [ { category: "general", text: "vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-1248", url: "https://www.suse.com/security/cve/CVE-2016-1248", }, { category: "external", summary: "SUSE Bug 1010685 for CVE-2016-1248", url: "https://bugzilla.suse.com/1010685", }, { category: "external", summary: "SUSE Bug 1173534 for CVE-2016-1248", url: "https://bugzilla.suse.com/1173534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2016-1248", }, { cve: "CVE-2017-17087", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17087", }, ], notes: [ { category: "general", text: "fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-17087", url: "https://www.suse.com/security/cve/CVE-2017-17087", }, { category: "external", summary: "SUSE Bug 1065958 for CVE-2017-17087", url: "https://bugzilla.suse.com/1065958", }, { category: "external", summary: "SUSE Bug 1070955 for CVE-2017-17087", url: "https://bugzilla.suse.com/1070955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2017-17087", }, { cve: "CVE-2017-5953", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-5953", }, ], notes: [ { category: "general", text: "vim before patch 8.0.0322 does not properly validate values for tree length when handling a spell file, which may result in an integer overflow at a memory allocation site and a resultant buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-5953", url: "https://www.suse.com/security/cve/CVE-2017-5953", }, { category: "external", summary: "SUSE Bug 1024724 for CVE-2017-5953", url: "https://bugzilla.suse.com/1024724", }, { category: "external", summary: "SUSE Bug 1123143 for CVE-2017-5953", url: "https://bugzilla.suse.com/1123143", }, { category: "external", summary: "SUSE Bug 1173534 for CVE-2017-5953", url: "https://bugzilla.suse.com/1173534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2017-5953", }, { cve: "CVE-2017-6349", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6349", }, ], notes: [ { category: "general", text: "An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-6349", url: "https://www.suse.com/security/cve/CVE-2017-6349", }, { category: "external", summary: "SUSE Bug 1027057 for CVE-2017-6349", url: "https://bugzilla.suse.com/1027057", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2017-6349", }, { cve: "CVE-2017-6350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6350", }, ], notes: [ { category: "general", text: "An integer overflow at an unserialize_uep memory allocation site would occur for vim before patch 8.0.0378, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2017-6350", url: "https://www.suse.com/security/cve/CVE-2017-6350", }, { category: "external", summary: "SUSE Bug 1027053 for CVE-2017-6350", url: "https://bugzilla.suse.com/1027053", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2017-6350", }, { cve: "CVE-2021-3778", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3778", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3778", url: "https://www.suse.com/security/cve/CVE-2021-3778", }, { category: "external", summary: "SUSE Bug 1190533 for CVE-2021-3778", url: "https://bugzilla.suse.com/1190533", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3796", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3796", url: "https://www.suse.com/security/cve/CVE-2021-3796", }, { category: "external", summary: "SUSE Bug 1190570 for CVE-2021-3796", url: "https://bugzilla.suse.com/1190570", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3796", }, { cve: "CVE-2021-3872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3872", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3872", url: "https://www.suse.com/security/cve/CVE-2021-3872", }, { category: "external", summary: "SUSE Bug 1191893 for CVE-2021-3872", url: "https://bugzilla.suse.com/1191893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3875", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3875", url: "https://www.suse.com/security/cve/CVE-2021-3875", }, { category: "external", summary: "SUSE Bug 1191770 for CVE-2021-3875", url: "https://bugzilla.suse.com/1191770", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3875", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3903", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3903", url: "https://www.suse.com/security/cve/CVE-2021-3903", }, { category: "external", summary: "SUSE Bug 1192167 for CVE-2021-3903", url: "https://bugzilla.suse.com/1192167", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3903", }, { cve: "CVE-2021-3927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3927", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3927", url: "https://www.suse.com/security/cve/CVE-2021-3927", }, { category: "external", summary: "SUSE Bug 1192481 for CVE-2021-3927", url: "https://bugzilla.suse.com/1192481", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3928", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use of Uninitialized Variable", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3928", url: "https://www.suse.com/security/cve/CVE-2021-3928", }, { category: "external", summary: "SUSE Bug 1192478 for CVE-2021-3928", url: "https://bugzilla.suse.com/1192478", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3968", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3968", url: "https://www.suse.com/security/cve/CVE-2021-3968", }, { category: "external", summary: "SUSE Bug 1192902 for CVE-2021-3968", url: "https://bugzilla.suse.com/1192902", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3973", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3973", url: "https://www.suse.com/security/cve/CVE-2021-3973", }, { category: "external", summary: "SUSE Bug 1192903 for CVE-2021-3973", url: "https://bugzilla.suse.com/1192903", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "critical", }, ], title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3974", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3974", url: "https://www.suse.com/security/cve/CVE-2021-3974", }, { category: "external", summary: "SUSE Bug 1192904 for CVE-2021-3974", url: "https://bugzilla.suse.com/1192904", }, { category: "external", summary: "SUSE Bug 1206818 for CVE-2021-3974", url: "https://bugzilla.suse.com/1206818", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3974", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3974", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3984", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-3984", url: "https://www.suse.com/security/cve/CVE-2021-3984", }, { category: "external", summary: "SUSE Bug 1193298 for CVE-2021-3984", url: "https://bugzilla.suse.com/1193298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4019", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4019", url: "https://www.suse.com/security/cve/CVE-2021-4019", }, { category: "external", summary: "SUSE Bug 1193294 for CVE-2021-4019", url: "https://bugzilla.suse.com/1193294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-4019", }, { cve: "CVE-2021-4069", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4069", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4069", url: "https://www.suse.com/security/cve/CVE-2021-4069", }, { category: "external", summary: "SUSE Bug 1193466 for CVE-2021-4069", url: "https://bugzilla.suse.com/1193466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-4069", }, { cve: "CVE-2021-4136", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4136", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4136", url: "https://www.suse.com/security/cve/CVE-2021-4136", }, { category: "external", summary: "SUSE Bug 1193905 for CVE-2021-4136", url: "https://bugzilla.suse.com/1193905", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2021-4136", }, { cve: "CVE-2021-4166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4166", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4166", url: "https://www.suse.com/security/cve/CVE-2021-4166", }, { category: "external", summary: "SUSE Bug 1194093 for CVE-2021-4166", url: "https://bugzilla.suse.com/1194093", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-4166", }, { cve: "CVE-2021-4192", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4192", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4192", url: "https://www.suse.com/security/cve/CVE-2021-4192", }, { category: "external", summary: "SUSE Bug 1194217 for CVE-2021-4192", url: "https://bugzilla.suse.com/1194217", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4193", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-4193", url: "https://www.suse.com/security/cve/CVE-2021-4193", }, { category: "external", summary: "SUSE Bug 1194216 for CVE-2021-4193", url: "https://bugzilla.suse.com/1194216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2021-4193", }, { cve: "CVE-2021-46059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-46059", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2021-46059", url: "https://www.suse.com/security/cve/CVE-2021-46059", }, { category: "external", summary: "SUSE Bug 1194556 for CVE-2021-46059", url: "https://bugzilla.suse.com/1194556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2021-46059", }, { cve: "CVE-2022-0128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0128", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0128", url: "https://www.suse.com/security/cve/CVE-2022-0128", }, { category: "external", summary: "SUSE Bug 1194388 for CVE-2022-0128", url: "https://bugzilla.suse.com/1194388", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-0128", }, { cve: "CVE-2022-0213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0213", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0213", url: "https://www.suse.com/security/cve/CVE-2022-0213", }, { category: "external", summary: "SUSE Bug 1194885 for CVE-2022-0213", url: "https://bugzilla.suse.com/1194885", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0213", }, { cve: "CVE-2022-0261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0261", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0261", url: "https://www.suse.com/security/cve/CVE-2022-0261", }, { category: "external", summary: "SUSE Bug 1194872 for CVE-2022-0261", url: "https://bugzilla.suse.com/1194872", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0318", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0318", url: "https://www.suse.com/security/cve/CVE-2022-0318", }, { category: "external", summary: "SUSE Bug 1195004 for CVE-2022-0318", url: "https://bugzilla.suse.com/1195004", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0319", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0319", url: "https://www.suse.com/security/cve/CVE-2022-0319", }, { category: "external", summary: "SUSE Bug 1195066 for CVE-2022-0319", url: "https://bugzilla.suse.com/1195066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0351", }, ], notes: [ { category: "general", text: "Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0351", url: "https://www.suse.com/security/cve/CVE-2022-0351", }, { category: "external", summary: "SUSE Bug 1195126 for CVE-2022-0351", url: "https://bugzilla.suse.com/1195126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0359", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0359", url: "https://www.suse.com/security/cve/CVE-2022-0359", }, { category: "external", summary: "SUSE Bug 1195203 for CVE-2022-0359", url: "https://bugzilla.suse.com/1195203", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0361", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0361", url: "https://www.suse.com/security/cve/CVE-2022-0361", }, { category: "external", summary: "SUSE Bug 1195202 for CVE-2022-0361", url: "https://bugzilla.suse.com/1195202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0361", }, { cve: "CVE-2022-0392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0392", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0392", url: "https://www.suse.com/security/cve/CVE-2022-0392", }, { category: "external", summary: "SUSE Bug 1195332 for CVE-2022-0392", url: "https://bugzilla.suse.com/1195332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0407", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0407", url: "https://www.suse.com/security/cve/CVE-2022-0407", }, { category: "external", summary: "SUSE Bug 1195354 for CVE-2022-0407", url: "https://bugzilla.suse.com/1195354", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2022-0407", }, { cve: "CVE-2022-0413", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0413", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0413", url: "https://www.suse.com/security/cve/CVE-2022-0413", }, { category: "external", summary: "SUSE Bug 1195356 for CVE-2022-0413", url: "https://bugzilla.suse.com/1195356", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2022-0413", }, { cve: "CVE-2022-0696", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0696", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-0696", url: "https://www.suse.com/security/cve/CVE-2022-0696", }, { category: "external", summary: "SUSE Bug 1196361 for CVE-2022-0696", url: "https://bugzilla.suse.com/1196361", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-0696", url: "https://bugzilla.suse.com/1205395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-0696", }, { cve: "CVE-2022-1381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1381", }, ], notes: [ { category: "general", text: "global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1381", url: "https://www.suse.com/security/cve/CVE-2022-1381", }, { category: "external", summary: "SUSE Bug 1198596 for CVE-2022-1381", url: "https://bugzilla.suse.com/1198596", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1420", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1420", url: "https://www.suse.com/security/cve/CVE-2022-1420", }, { category: "external", summary: "SUSE Bug 1198748 for CVE-2022-1420", url: "https://bugzilla.suse.com/1198748", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1420", }, { cve: "CVE-2022-1616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1616", }, ], notes: [ { category: "general", text: "Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1616", url: "https://www.suse.com/security/cve/CVE-2022-1616", }, { category: "external", summary: "SUSE Bug 1199331 for CVE-2022-1616", url: "https://bugzilla.suse.com/1199331", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1619", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1619", url: "https://www.suse.com/security/cve/CVE-2022-1619", }, { category: "external", summary: "SUSE Bug 1199333 for CVE-2022-1619", url: "https://bugzilla.suse.com/1199333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1620", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1620", url: "https://www.suse.com/security/cve/CVE-2022-1620", }, { category: "external", summary: "SUSE Bug 1199334 for CVE-2022-1620", url: "https://bugzilla.suse.com/1199334", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1620", }, { cve: "CVE-2022-1720", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1720", }, ], notes: [ { category: "general", text: "Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1720", url: "https://www.suse.com/security/cve/CVE-2022-1720", }, { category: "external", summary: "SUSE Bug 1200732 for CVE-2022-1720", url: "https://bugzilla.suse.com/1200732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1720", }, { cve: "CVE-2022-1733", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1733", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1733", url: "https://www.suse.com/security/cve/CVE-2022-1733", }, { category: "external", summary: "SUSE Bug 1199655 for CVE-2022-1733", url: "https://bugzilla.suse.com/1199655", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1735", }, ], notes: [ { category: "general", text: "Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1735", url: "https://www.suse.com/security/cve/CVE-2022-1735", }, { category: "external", summary: "SUSE Bug 1199651 for CVE-2022-1735", url: "https://bugzilla.suse.com/1199651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1735", }, { cve: "CVE-2022-1771", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1771", }, ], notes: [ { category: "general", text: "Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1771", url: "https://www.suse.com/security/cve/CVE-2022-1771", }, { category: "external", summary: "SUSE Bug 1199693 for CVE-2022-1771", url: "https://bugzilla.suse.com/1199693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1785", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1785", url: "https://www.suse.com/security/cve/CVE-2022-1785", }, { category: "external", summary: "SUSE Bug 1199745 for CVE-2022-1785", url: "https://bugzilla.suse.com/1199745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1796", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.4979.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1796", url: "https://www.suse.com/security/cve/CVE-2022-1796", }, { category: "external", summary: "SUSE Bug 1199747 for CVE-2022-1796", url: "https://bugzilla.suse.com/1199747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1851", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1851", url: "https://www.suse.com/security/cve/CVE-2022-1851", }, { category: "external", summary: "SUSE Bug 1199936 for CVE-2022-1851", url: "https://bugzilla.suse.com/1199936", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1897", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1897", url: "https://www.suse.com/security/cve/CVE-2022-1897", }, { category: "external", summary: "SUSE Bug 1200010 for CVE-2022-1897", url: "https://bugzilla.suse.com/1200010", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1898", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1898", url: "https://www.suse.com/security/cve/CVE-2022-1898", }, { category: "external", summary: "SUSE Bug 1200011 for CVE-2022-1898", url: "https://bugzilla.suse.com/1200011", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1927", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1927", url: "https://www.suse.com/security/cve/CVE-2022-1927", }, { category: "external", summary: "SUSE Bug 1200012 for CVE-2022-1927", url: "https://bugzilla.suse.com/1200012", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1927", }, { cve: "CVE-2022-1968", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1968", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-1968", url: "https://www.suse.com/security/cve/CVE-2022-1968", }, { category: "external", summary: "SUSE Bug 1200270 for CVE-2022-1968", url: "https://bugzilla.suse.com/1200270", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-1968", }, { cve: "CVE-2022-2124", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2124", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2124", url: "https://www.suse.com/security/cve/CVE-2022-2124", }, { category: "external", summary: "SUSE Bug 1200697 for CVE-2022-2124", url: "https://bugzilla.suse.com/1200697", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2125", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2125", url: "https://www.suse.com/security/cve/CVE-2022-2125", }, { category: "external", summary: "SUSE Bug 1200698 for CVE-2022-2125", url: "https://bugzilla.suse.com/1200698", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-2125", url: "https://bugzilla.suse.com/1205395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2126", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2126", url: "https://www.suse.com/security/cve/CVE-2022-2126", }, { category: "external", summary: "SUSE Bug 1200700 for CVE-2022-2126", url: "https://bugzilla.suse.com/1200700", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2126", }, { cve: "CVE-2022-2129", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2129", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2129", url: "https://www.suse.com/security/cve/CVE-2022-2129", }, { category: "external", summary: "SUSE Bug 1200701 for CVE-2022-2129", url: "https://bugzilla.suse.com/1200701", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2129", }, { cve: "CVE-2022-2175", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2175", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2175", url: "https://www.suse.com/security/cve/CVE-2022-2175", }, { category: "external", summary: "SUSE Bug 1200904 for CVE-2022-2175", url: "https://bugzilla.suse.com/1200904", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2175", }, { cve: "CVE-2022-2182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2182", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2182", url: "https://www.suse.com/security/cve/CVE-2022-2182", }, { category: "external", summary: "SUSE Bug 1200903 for CVE-2022-2182", url: "https://bugzilla.suse.com/1200903", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2182", }, { cve: "CVE-2022-2183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2183", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2183", url: "https://www.suse.com/security/cve/CVE-2022-2183", }, { category: "external", summary: "SUSE Bug 1200902 for CVE-2022-2183", url: "https://bugzilla.suse.com/1200902", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2183", }, { cve: "CVE-2022-2206", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2206", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2206", url: "https://www.suse.com/security/cve/CVE-2022-2206", }, { category: "external", summary: "SUSE Bug 1201155 for CVE-2022-2206", url: "https://bugzilla.suse.com/1201155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2206", }, { cve: "CVE-2022-2207", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2207", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2207", url: "https://www.suse.com/security/cve/CVE-2022-2207", }, { category: "external", summary: "SUSE Bug 1201153 for CVE-2022-2207", url: "https://bugzilla.suse.com/1201153", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2207", }, { cve: "CVE-2022-2208", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2208", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2208", url: "https://www.suse.com/security/cve/CVE-2022-2208", }, { category: "external", summary: "SUSE Bug 1201152 for CVE-2022-2208", url: "https://bugzilla.suse.com/1201152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2208", }, { cve: "CVE-2022-2210", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2210", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2210", url: "https://www.suse.com/security/cve/CVE-2022-2210", }, { category: "external", summary: "SUSE Bug 1201151 for CVE-2022-2210", url: "https://bugzilla.suse.com/1201151", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2210", }, { cve: "CVE-2022-2231", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2231", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2231", url: "https://www.suse.com/security/cve/CVE-2022-2231", }, { category: "external", summary: "SUSE Bug 1201150 for CVE-2022-2231", url: "https://bugzilla.suse.com/1201150", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2231", }, { cve: "CVE-2022-2257", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2257", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2257", url: "https://www.suse.com/security/cve/CVE-2022-2257", }, { category: "external", summary: "SUSE Bug 1201154 for CVE-2022-2257", url: "https://bugzilla.suse.com/1201154", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2257", }, { cve: "CVE-2022-2264", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2264", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2264", url: "https://www.suse.com/security/cve/CVE-2022-2264", }, { category: "external", summary: "SUSE Bug 1201132 for CVE-2022-2264", url: "https://bugzilla.suse.com/1201132", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2264", }, { cve: "CVE-2022-2284", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2284", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2284", url: "https://www.suse.com/security/cve/CVE-2022-2284", }, { category: "external", summary: "SUSE Bug 1201133 for CVE-2022-2284", url: "https://bugzilla.suse.com/1201133", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2284", }, { cve: "CVE-2022-2285", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2285", }, ], notes: [ { category: "general", text: "Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2285", url: "https://www.suse.com/security/cve/CVE-2022-2285", }, { category: "external", summary: "SUSE Bug 1201134 for CVE-2022-2285", url: "https://bugzilla.suse.com/1201134", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2285", }, { cve: "CVE-2022-2286", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2286", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2286", url: "https://www.suse.com/security/cve/CVE-2022-2286", }, { category: "external", summary: "SUSE Bug 1201135 for CVE-2022-2286", url: "https://bugzilla.suse.com/1201135", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2286", }, { cve: "CVE-2022-2287", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2287", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2287", url: "https://www.suse.com/security/cve/CVE-2022-2287", }, { category: "external", summary: "SUSE Bug 1201136 for CVE-2022-2287", url: "https://bugzilla.suse.com/1201136", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2287", }, { cve: "CVE-2022-2304", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2304", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2304", url: "https://www.suse.com/security/cve/CVE-2022-2304", }, { category: "external", summary: "SUSE Bug 1201249 for CVE-2022-2304", url: "https://bugzilla.suse.com/1201249", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2304", }, { cve: "CVE-2022-2343", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2343", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2343", url: "https://www.suse.com/security/cve/CVE-2022-2343", }, { category: "external", summary: "SUSE Bug 1201356 for CVE-2022-2343", url: "https://bugzilla.suse.com/1201356", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2343", }, { cve: "CVE-2022-2344", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2344", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2344", url: "https://www.suse.com/security/cve/CVE-2022-2344", }, { category: "external", summary: "SUSE Bug 1201359 for CVE-2022-2344", url: "https://bugzilla.suse.com/1201359", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2344", }, { cve: "CVE-2022-2345", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2345", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0046.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2345", url: "https://www.suse.com/security/cve/CVE-2022-2345", }, { category: "external", summary: "SUSE Bug 1201363 for CVE-2022-2345", url: "https://bugzilla.suse.com/1201363", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2345", }, { cve: "CVE-2022-2522", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2522", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2522", url: "https://www.suse.com/security/cve/CVE-2022-2522", }, { category: "external", summary: "SUSE Bug 1201863 for CVE-2022-2522", url: "https://bugzilla.suse.com/1201863", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2522", }, { cve: "CVE-2022-2571", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2571", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2571", url: "https://www.suse.com/security/cve/CVE-2022-2571", }, { category: "external", summary: "SUSE Bug 1202046 for CVE-2022-2571", url: "https://bugzilla.suse.com/1202046", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2571", }, { cve: "CVE-2022-2580", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2580", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2580", url: "https://www.suse.com/security/cve/CVE-2022-2580", }, { category: "external", summary: "SUSE Bug 1202049 for CVE-2022-2580", url: "https://bugzilla.suse.com/1202049", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2580", }, { cve: "CVE-2022-2581", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2581", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2581", url: "https://www.suse.com/security/cve/CVE-2022-2581", }, { category: "external", summary: "SUSE Bug 1202050 for CVE-2022-2581", url: "https://bugzilla.suse.com/1202050", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2581", }, { cve: "CVE-2022-2598", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2598", }, ], notes: [ { category: "general", text: "Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2598", url: "https://www.suse.com/security/cve/CVE-2022-2598", }, { category: "external", summary: "SUSE Bug 1202051 for CVE-2022-2598", url: "https://bugzilla.suse.com/1202051", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2598", }, { cve: "CVE-2022-2816", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2816", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2816", url: "https://www.suse.com/security/cve/CVE-2022-2816", }, { category: "external", summary: "SUSE Bug 1202421 for CVE-2022-2816", url: "https://bugzilla.suse.com/1202421", }, { category: "external", summary: "SUSE Bug 1203576 for CVE-2022-2816", url: "https://bugzilla.suse.com/1203576", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2816", }, { cve: "CVE-2022-2817", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2817", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0213.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2817", url: "https://www.suse.com/security/cve/CVE-2022-2817", }, { category: "external", summary: "SUSE Bug 1202420 for CVE-2022-2817", url: "https://bugzilla.suse.com/1202420", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2817", }, { cve: "CVE-2022-2819", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2819", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0211.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2819", url: "https://www.suse.com/security/cve/CVE-2022-2819", }, { category: "external", summary: "SUSE Bug 1202414 for CVE-2022-2819", url: "https://bugzilla.suse.com/1202414", }, { category: "external", summary: "SUSE Bug 1203576 for CVE-2022-2819", url: "https://bugzilla.suse.com/1203576", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2819", }, { cve: "CVE-2022-2845", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2845", }, ], notes: [ { category: "general", text: "Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.\n\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2845", url: "https://www.suse.com/security/cve/CVE-2022-2845", }, { category: "external", summary: "SUSE Bug 1202515 for CVE-2022-2845", url: "https://bugzilla.suse.com/1202515", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2845", }, { cve: "CVE-2022-2849", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2849", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2849", url: "https://www.suse.com/security/cve/CVE-2022-2849", }, { category: "external", summary: "SUSE Bug 1202512 for CVE-2022-2849", url: "https://bugzilla.suse.com/1202512", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2849", }, { cve: "CVE-2022-2862", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2862", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0221.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2862", url: "https://www.suse.com/security/cve/CVE-2022-2862", }, { category: "external", summary: "SUSE Bug 1202511 for CVE-2022-2862", url: "https://bugzilla.suse.com/1202511", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2862", }, { cve: "CVE-2022-2874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2874", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2874", url: "https://www.suse.com/security/cve/CVE-2022-2874", }, { category: "external", summary: "SUSE Bug 1202552 for CVE-2022-2874", url: "https://bugzilla.suse.com/1202552", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2874", }, { cve: "CVE-2022-2889", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2889", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0225.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2889", url: "https://www.suse.com/security/cve/CVE-2022-2889", }, { category: "external", summary: "SUSE Bug 1202599 for CVE-2022-2889", url: "https://bugzilla.suse.com/1202599", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2889", }, { cve: "CVE-2022-2923", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2923", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2923", url: "https://www.suse.com/security/cve/CVE-2022-2923", }, { category: "external", summary: "SUSE Bug 1202687 for CVE-2022-2923", url: "https://bugzilla.suse.com/1202687", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2923", }, { cve: "CVE-2022-2946", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2946", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0246.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2946", url: "https://www.suse.com/security/cve/CVE-2022-2946", }, { category: "external", summary: "SUSE Bug 1202689 for CVE-2022-2946", url: "https://bugzilla.suse.com/1202689", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2946", }, { cve: "CVE-2022-2980", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2980", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2980", url: "https://www.suse.com/security/cve/CVE-2022-2980", }, { category: "external", summary: "SUSE Bug 1203155 for CVE-2022-2980", url: "https://bugzilla.suse.com/1203155", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-2980", }, { cve: "CVE-2022-2982", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-2982", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0260.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-2982", url: "https://www.suse.com/security/cve/CVE-2022-2982", }, { category: "external", summary: "SUSE Bug 1203152 for CVE-2022-2982", url: "https://bugzilla.suse.com/1203152", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-2982", }, { cve: "CVE-2022-3016", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3016", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0286.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3016", url: "https://www.suse.com/security/cve/CVE-2022-3016", }, { category: "external", summary: "SUSE Bug 1202862 for CVE-2022-3016", url: "https://bugzilla.suse.com/1202862", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-3016", }, { cve: "CVE-2022-3037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3037", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0322.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3037", url: "https://www.suse.com/security/cve/CVE-2022-3037", }, { category: "external", summary: "SUSE Bug 1202962 for CVE-2022-3037", url: "https://bugzilla.suse.com/1202962", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-3037", }, { cve: "CVE-2022-3099", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3099", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0360.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3099", url: "https://www.suse.com/security/cve/CVE-2022-3099", }, { category: "external", summary: "SUSE Bug 1203110 for CVE-2022-3099", url: "https://bugzilla.suse.com/1203110", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3099", }, { cve: "CVE-2022-3134", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3134", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0389.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3134", url: "https://www.suse.com/security/cve/CVE-2022-3134", }, { category: "external", summary: "SUSE Bug 1203194 for CVE-2022-3134", url: "https://bugzilla.suse.com/1203194", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-3134", }, { cve: "CVE-2022-3153", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3153", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3153", url: "https://www.suse.com/security/cve/CVE-2022-3153", }, { category: "external", summary: "SUSE Bug 1203272 for CVE-2022-3153", url: "https://bugzilla.suse.com/1203272", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3153", }, { cve: "CVE-2022-3234", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3234", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0483.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3234", url: "https://www.suse.com/security/cve/CVE-2022-3234", }, { category: "external", summary: "SUSE Bug 1203508 for CVE-2022-3234", url: "https://bugzilla.suse.com/1203508", }, { category: "external", summary: "SUSE Bug 1206240 for CVE-2022-3234", url: "https://bugzilla.suse.com/1206240", }, { category: "external", summary: "SUSE Bug 1208002 for CVE-2022-3234", url: "https://bugzilla.suse.com/1208002", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-3234", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-3234", url: "https://bugzilla.suse.com/1208651", }, { category: "external", summary: "SUSE Bug 1209329 for CVE-2022-3234", url: "https://bugzilla.suse.com/1209329", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "important", }, ], title: "CVE-2022-3234", }, { cve: "CVE-2022-3235", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3235", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0490.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3235", url: "https://www.suse.com/security/cve/CVE-2022-3235", }, { category: "external", summary: "SUSE Bug 1203509 for CVE-2022-3235", url: "https://bugzilla.suse.com/1203509", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-3235", }, { cve: "CVE-2022-3278", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3278", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0552.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3278", url: "https://www.suse.com/security/cve/CVE-2022-3278", }, { category: "external", summary: "SUSE Bug 1203799 for CVE-2022-3278", url: "https://bugzilla.suse.com/1203799", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "low", }, ], title: "CVE-2022-3278", }, { cve: "CVE-2022-3296", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3296", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3296", url: "https://www.suse.com/security/cve/CVE-2022-3296", }, { category: "external", summary: "SUSE Bug 1203796 for CVE-2022-3296", url: "https://bugzilla.suse.com/1203796", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-3296", url: "https://bugzilla.suse.com/1205395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3296", }, { cve: "CVE-2022-3297", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3297", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0579.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3297", url: "https://www.suse.com/security/cve/CVE-2022-3297", }, { category: "external", summary: "SUSE Bug 1203797 for CVE-2022-3297", url: "https://bugzilla.suse.com/1203797", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3297", }, { cve: "CVE-2022-3324", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3324", }, ], notes: [ { category: "general", text: "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3324", url: "https://www.suse.com/security/cve/CVE-2022-3324", }, { category: "external", summary: "SUSE Bug 1203820 for CVE-2022-3324", url: "https://bugzilla.suse.com/1203820", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-3324", url: "https://bugzilla.suse.com/1205395", }, { category: "external", summary: "SUSE Bug 1206240 for CVE-2022-3324", url: "https://bugzilla.suse.com/1206240", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3324", }, { cve: "CVE-2022-3352", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3352", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 9.0.0614.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3352", url: "https://www.suse.com/security/cve/CVE-2022-3352", }, { category: "external", summary: "SUSE Bug 1203924 for CVE-2022-3352", url: "https://bugzilla.suse.com/1203924", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3352", }, { cve: "CVE-2022-3705", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-3705", }, ], notes: [ { category: "general", text: "A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2022-3705", url: "https://www.suse.com/security/cve/CVE-2022-3705", }, { category: "external", summary: "SUSE Bug 1204779 for CVE-2022-3705", url: "https://bugzilla.suse.com/1204779", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP2-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:gvim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-9.0.0814-17.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-9.0.0814-17.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud 9:vim-data-common-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:gvim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-9.0.0814-17.9.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:vim-data-9.0.0814-17.9.1.noarch", "SUSE OpenStack Cloud Crowbar 9:vim-data-common-9.0.0814-17.9.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-27T04:16:45Z", details: "moderate", }, ], title: "CVE-2022-3705", }, ], }
suse-su-2022:2102-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for vim", title: "Title of the patch", }, { category: "description", text: "This update for vim fixes the following issues:\n\n- CVE-2017-17087: Fixed information leak via .swp files (bsc#1070955).\n- CVE-2021-3875: Fixed heap-based buffer overflow (bsc#1191770).\n- CVE-2021-3903: Fixed heap-based buffer overflow (bsc#1192167).\n- CVE-2021-3968: Fixed heap-based buffer overflow (bsc#1192902).\n- CVE-2021-3973: Fixed heap-based buffer overflow (bsc#1192903).\n- CVE-2021-3974: Fixed use-after-free (bsc#1192904).\n- CVE-2021-4069: Fixed use-after-free in ex_open()in src/ex_docmd.c (bsc#1193466).\n- CVE-2021-4136: Fixed heap-based buffer overflow (bsc#1193905).\n- CVE-2021-4166: Fixed out-of-bounds read (bsc#1194093).\n- CVE-2021-4192: Fixed use-after-free (bsc#1194217).\n- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).\n- CVE-2022-0128: Fixed out-of-bounds read (bsc#1194388).\n- CVE-2022-0213: Fixed heap-based buffer overflow (bsc#1194885).\n- CVE-2022-0261: Fixed heap-based buffer overflow (bsc#1194872).\n- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).\n- CVE-2022-0359: Fixed heap-based buffer overflow in init_ccline() in ex_getln.c (bsc#1195203).\n- CVE-2022-0392: Fixed heap-based buffer overflow (bsc#1195332).\n- CVE-2022-0407: Fixed heap-based buffer overflow (bsc#1195354).\n- CVE-2022-0696: Fixed NULL pointer dereference (bsc#1196361).\n- CVE-2022-1381: Fixed global heap buffer overflow in skip_range (bsc#1198596).\n- CVE-2022-1420: Fixed out-of-range pointer offset (bsc#1198748).\n- CVE-2022-1616: Fixed use-after-free in append_command (bsc#1199331).\n- CVE-2022-1619: Fixed heap-based Buffer Overflow in function cmdline_erase_chars (bsc#1199333).\n- CVE-2022-1620: Fixed NULL pointer dereference in function vim_regexec_string (bsc#1199334).\n- CVE-2022-1733: Fixed heap-based buffer overflow in cindent.c (bsc#1199655).\n- CVE-2022-1735: Fixed heap-based buffer overflow (bsc#1199651).\n- CVE-2022-1771: Fixed stack exhaustion (bsc#1199693).\n- CVE-2022-1785: Fixed out-of-bounds write (bsc#1199745).\n- CVE-2022-1796: Fixed use-after-free in find_pattern_in_path (bsc#1199747).\n- CVE-2022-1851: Fixed out-of-bounds read (bsc#1199936).\n- CVE-2022-1897: Fixed out-of-bounds write (bsc#1200010).\n- CVE-2022-1898: Fixed use-after-free (bsc#1200011).\n- CVE-2022-1927: Fixed buffer over-read (bsc#1200012).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-2102,SUSE-SLE-Module-Basesystem-15-SP3-2022-2102,SUSE-SLE-Module-Basesystem-15-SP4-2022-2102,SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-2102,SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-2102,SUSE-SLE-Product-HPC-15-2022-2102,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2102,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2102,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-2102,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-2102,SUSE-SLE-Product-SLES-15-2022-2102,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2102,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2102,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-2102,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-2102,SUSE-SLE-Product-SLES_SAP-15-2022-2102,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2102,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-2102,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-2102,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-2102,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-2102,SUSE-SUSE-MicroOS-5.1-2022-2102,SUSE-SUSE-MicroOS-5.2-2022-2102,SUSE-Storage-6-2022-2102,SUSE-Storage-7-2022-2102,openSUSE-SLE-15.3-2022-2102,openSUSE-SLE-15.4-2022-2102", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2102-1.json", }, { category: "self", summary: "URL for SUSE-SU-2022:2102-1", url: "https://www.suse.com/support/update/announcement/2022/suse-su-20222102-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2022:2102-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html", }, { category: "self", summary: "SUSE Bug 1070955", url: "https://bugzilla.suse.com/1070955", }, { category: "self", summary: "SUSE Bug 1191770", url: "https://bugzilla.suse.com/1191770", }, { category: "self", summary: "SUSE Bug 1192167", url: "https://bugzilla.suse.com/1192167", }, { category: "self", summary: "SUSE Bug 1192902", url: "https://bugzilla.suse.com/1192902", }, { category: "self", summary: "SUSE Bug 1192903", url: "https://bugzilla.suse.com/1192903", }, { category: "self", summary: "SUSE Bug 1192904", url: "https://bugzilla.suse.com/1192904", }, { category: "self", summary: "SUSE Bug 1193466", url: "https://bugzilla.suse.com/1193466", }, { category: "self", summary: "SUSE Bug 1193905", url: "https://bugzilla.suse.com/1193905", }, { category: "self", summary: "SUSE Bug 1194093", url: "https://bugzilla.suse.com/1194093", }, { category: "self", summary: "SUSE Bug 1194216", url: "https://bugzilla.suse.com/1194216", }, { category: "self", summary: "SUSE Bug 1194217", url: "https://bugzilla.suse.com/1194217", }, { category: "self", summary: "SUSE Bug 1194388", url: "https://bugzilla.suse.com/1194388", }, { category: "self", summary: "SUSE Bug 1194872", url: "https://bugzilla.suse.com/1194872", }, { category: "self", summary: "SUSE Bug 1194885", url: "https://bugzilla.suse.com/1194885", }, { category: "self", summary: "SUSE Bug 1195004", url: "https://bugzilla.suse.com/1195004", }, { category: "self", summary: "SUSE Bug 1195203", url: "https://bugzilla.suse.com/1195203", }, { category: "self", summary: "SUSE Bug 1195332", url: "https://bugzilla.suse.com/1195332", }, { category: "self", summary: "SUSE Bug 1195354", url: "https://bugzilla.suse.com/1195354", }, { category: "self", summary: "SUSE Bug 1196361", url: "https://bugzilla.suse.com/1196361", }, { category: "self", summary: "SUSE Bug 1198596", url: "https://bugzilla.suse.com/1198596", }, { category: "self", summary: "SUSE Bug 1198748", url: "https://bugzilla.suse.com/1198748", }, { category: "self", summary: "SUSE Bug 1199331", url: "https://bugzilla.suse.com/1199331", }, { category: "self", summary: "SUSE Bug 1199333", url: "https://bugzilla.suse.com/1199333", }, { category: "self", summary: "SUSE Bug 1199334", url: "https://bugzilla.suse.com/1199334", }, { category: "self", summary: "SUSE Bug 1199651", url: "https://bugzilla.suse.com/1199651", }, { category: "self", summary: "SUSE Bug 1199655", url: "https://bugzilla.suse.com/1199655", }, { category: "self", summary: "SUSE Bug 1199693", url: "https://bugzilla.suse.com/1199693", }, { category: "self", summary: "SUSE Bug 1199745", url: "https://bugzilla.suse.com/1199745", }, { category: "self", summary: "SUSE Bug 1199747", url: "https://bugzilla.suse.com/1199747", }, { category: "self", summary: "SUSE Bug 1199936", url: "https://bugzilla.suse.com/1199936", }, { category: "self", summary: "SUSE Bug 1200010", url: "https://bugzilla.suse.com/1200010", }, { category: "self", summary: "SUSE Bug 1200011", url: "https://bugzilla.suse.com/1200011", }, { category: "self", summary: "SUSE Bug 1200012", url: "https://bugzilla.suse.com/1200012", }, { category: "self", summary: "SUSE CVE CVE-2017-17087 page", url: "https://www.suse.com/security/cve/CVE-2017-17087/", }, { category: "self", summary: "SUSE CVE CVE-2021-3778 page", url: "https://www.suse.com/security/cve/CVE-2021-3778/", }, { category: "self", summary: "SUSE CVE CVE-2021-3796 page", url: "https://www.suse.com/security/cve/CVE-2021-3796/", }, { category: "self", summary: "SUSE CVE CVE-2021-3872 page", url: "https://www.suse.com/security/cve/CVE-2021-3872/", }, { category: "self", summary: "SUSE CVE CVE-2021-3875 page", url: "https://www.suse.com/security/cve/CVE-2021-3875/", }, { category: "self", summary: "SUSE CVE CVE-2021-3903 page", url: "https://www.suse.com/security/cve/CVE-2021-3903/", }, { category: "self", summary: "SUSE CVE CVE-2021-3927 page", url: "https://www.suse.com/security/cve/CVE-2021-3927/", }, { category: "self", summary: "SUSE CVE CVE-2021-3928 page", url: "https://www.suse.com/security/cve/CVE-2021-3928/", }, { category: "self", summary: "SUSE CVE CVE-2021-3968 page", url: "https://www.suse.com/security/cve/CVE-2021-3968/", }, { category: "self", summary: "SUSE CVE CVE-2021-3973 page", url: "https://www.suse.com/security/cve/CVE-2021-3973/", }, { category: "self", summary: "SUSE CVE CVE-2021-3974 page", url: "https://www.suse.com/security/cve/CVE-2021-3974/", }, { category: "self", summary: "SUSE CVE CVE-2021-3984 page", url: "https://www.suse.com/security/cve/CVE-2021-3984/", }, { category: "self", summary: "SUSE CVE CVE-2021-4019 page", url: "https://www.suse.com/security/cve/CVE-2021-4019/", }, { category: "self", summary: "SUSE CVE CVE-2021-4069 page", url: "https://www.suse.com/security/cve/CVE-2021-4069/", }, { category: "self", summary: "SUSE CVE CVE-2021-4136 page", url: "https://www.suse.com/security/cve/CVE-2021-4136/", }, { category: "self", summary: "SUSE CVE CVE-2021-4166 page", url: "https://www.suse.com/security/cve/CVE-2021-4166/", }, { category: "self", summary: "SUSE CVE CVE-2021-4192 page", url: "https://www.suse.com/security/cve/CVE-2021-4192/", }, { category: "self", summary: "SUSE CVE CVE-2021-4193 page", url: "https://www.suse.com/security/cve/CVE-2021-4193/", }, { category: "self", summary: "SUSE CVE CVE-2021-46059 page", url: "https://www.suse.com/security/cve/CVE-2021-46059/", }, { category: "self", summary: "SUSE CVE CVE-2022-0128 page", url: "https://www.suse.com/security/cve/CVE-2022-0128/", }, { category: "self", summary: "SUSE CVE CVE-2022-0213 page", url: "https://www.suse.com/security/cve/CVE-2022-0213/", }, { category: "self", summary: "SUSE CVE CVE-2022-0261 page", url: "https://www.suse.com/security/cve/CVE-2022-0261/", }, { category: "self", summary: "SUSE CVE CVE-2022-0318 page", url: "https://www.suse.com/security/cve/CVE-2022-0318/", }, { category: "self", summary: "SUSE CVE CVE-2022-0319 page", url: "https://www.suse.com/security/cve/CVE-2022-0319/", }, { category: "self", summary: "SUSE CVE CVE-2022-0351 page", url: "https://www.suse.com/security/cve/CVE-2022-0351/", }, { category: "self", summary: "SUSE CVE CVE-2022-0359 page", url: "https://www.suse.com/security/cve/CVE-2022-0359/", }, { category: "self", summary: "SUSE CVE CVE-2022-0361 page", url: "https://www.suse.com/security/cve/CVE-2022-0361/", }, { category: "self", summary: "SUSE CVE CVE-2022-0392 page", url: "https://www.suse.com/security/cve/CVE-2022-0392/", }, { category: "self", summary: "SUSE CVE CVE-2022-0407 page", url: "https://www.suse.com/security/cve/CVE-2022-0407/", }, { category: "self", summary: "SUSE CVE CVE-2022-0413 page", url: "https://www.suse.com/security/cve/CVE-2022-0413/", }, { category: "self", summary: "SUSE CVE CVE-2022-0696 page", url: "https://www.suse.com/security/cve/CVE-2022-0696/", }, { category: "self", summary: "SUSE CVE CVE-2022-1381 page", url: "https://www.suse.com/security/cve/CVE-2022-1381/", }, { category: "self", summary: "SUSE CVE CVE-2022-1420 page", url: "https://www.suse.com/security/cve/CVE-2022-1420/", }, { category: "self", summary: "SUSE CVE CVE-2022-1616 page", url: "https://www.suse.com/security/cve/CVE-2022-1616/", }, { category: "self", summary: "SUSE CVE CVE-2022-1619 page", url: "https://www.suse.com/security/cve/CVE-2022-1619/", }, { category: "self", summary: "SUSE CVE CVE-2022-1620 page", url: "https://www.suse.com/security/cve/CVE-2022-1620/", }, { category: "self", summary: "SUSE CVE CVE-2022-1733 page", url: "https://www.suse.com/security/cve/CVE-2022-1733/", }, { category: "self", summary: "SUSE CVE CVE-2022-1735 page", url: "https://www.suse.com/security/cve/CVE-2022-1735/", }, { category: "self", summary: "SUSE CVE CVE-2022-1771 page", url: "https://www.suse.com/security/cve/CVE-2022-1771/", }, { category: "self", summary: "SUSE CVE CVE-2022-1785 page", url: "https://www.suse.com/security/cve/CVE-2022-1785/", }, { category: "self", summary: "SUSE CVE CVE-2022-1796 page", url: "https://www.suse.com/security/cve/CVE-2022-1796/", }, { category: "self", summary: "SUSE CVE CVE-2022-1851 page", url: "https://www.suse.com/security/cve/CVE-2022-1851/", }, { category: "self", summary: "SUSE CVE CVE-2022-1897 page", url: "https://www.suse.com/security/cve/CVE-2022-1897/", }, { category: "self", summary: "SUSE CVE CVE-2022-1898 page", url: "https://www.suse.com/security/cve/CVE-2022-1898/", }, { category: "self", summary: "SUSE CVE CVE-2022-1927 page", url: "https://www.suse.com/security/cve/CVE-2022-1927/", }, ], title: "Security update for vim", tracking: { current_release_date: "2022-06-16T13:18:54Z", generator: { date: "2022-06-16T13:18:54Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2022:2102-1", initial_release_date: "2022-06-16T13:18:54Z", revision_history: [ { date: "2022-06-16T13:18:54Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "gvim-8.2.5038-150000.5.21.1.aarch64", product: { name: "gvim-8.2.5038-150000.5.21.1.aarch64", product_id: "gvim-8.2.5038-150000.5.21.1.aarch64", }, }, { category: "product_version", name: "vim-8.2.5038-150000.5.21.1.aarch64", product: { name: "vim-8.2.5038-150000.5.21.1.aarch64", product_id: "vim-8.2.5038-150000.5.21.1.aarch64", }, }, { category: "product_version", name: "vim-small-8.2.5038-150000.5.21.1.aarch64", product: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64", product_id: "vim-small-8.2.5038-150000.5.21.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "gvim-8.2.5038-150000.5.21.1.i586", product: { name: "gvim-8.2.5038-150000.5.21.1.i586", product_id: "gvim-8.2.5038-150000.5.21.1.i586", }, }, { category: "product_version", name: "vim-8.2.5038-150000.5.21.1.i586", product: { name: "vim-8.2.5038-150000.5.21.1.i586", product_id: "vim-8.2.5038-150000.5.21.1.i586", }, }, { category: "product_version", name: "vim-small-8.2.5038-150000.5.21.1.i586", product: { name: "vim-small-8.2.5038-150000.5.21.1.i586", product_id: "vim-small-8.2.5038-150000.5.21.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "vim-data-8.2.5038-150000.5.21.1.noarch", product: { name: "vim-data-8.2.5038-150000.5.21.1.noarch", product_id: "vim-data-8.2.5038-150000.5.21.1.noarch", }, }, { category: "product_version", name: "vim-data-common-8.2.5038-150000.5.21.1.noarch", product: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch", product_id: "vim-data-common-8.2.5038-150000.5.21.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "gvim-8.2.5038-150000.5.21.1.ppc64le", product: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le", product_id: "gvim-8.2.5038-150000.5.21.1.ppc64le", }, }, { category: "product_version", name: "vim-8.2.5038-150000.5.21.1.ppc64le", product: { name: "vim-8.2.5038-150000.5.21.1.ppc64le", product_id: "vim-8.2.5038-150000.5.21.1.ppc64le", }, }, { category: "product_version", name: "vim-small-8.2.5038-150000.5.21.1.ppc64le", product: { name: "vim-small-8.2.5038-150000.5.21.1.ppc64le", product_id: "vim-small-8.2.5038-150000.5.21.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "gvim-8.2.5038-150000.5.21.1.s390x", product: { name: "gvim-8.2.5038-150000.5.21.1.s390x", product_id: "gvim-8.2.5038-150000.5.21.1.s390x", }, }, { category: "product_version", name: "vim-8.2.5038-150000.5.21.1.s390x", product: { name: "vim-8.2.5038-150000.5.21.1.s390x", product_id: "vim-8.2.5038-150000.5.21.1.s390x", }, }, { category: "product_version", name: "vim-small-8.2.5038-150000.5.21.1.s390x", product: { name: "vim-small-8.2.5038-150000.5.21.1.s390x", product_id: "vim-small-8.2.5038-150000.5.21.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "gvim-8.2.5038-150000.5.21.1.x86_64", product: { name: "gvim-8.2.5038-150000.5.21.1.x86_64", product_id: "gvim-8.2.5038-150000.5.21.1.x86_64", }, }, { category: "product_version", name: "vim-8.2.5038-150000.5.21.1.x86_64", product: { name: "vim-8.2.5038-150000.5.21.1.x86_64", product_id: "vim-8.2.5038-150000.5.21.1.x86_64", }, }, { category: "product_version", name: "vim-small-8.2.5038-150000.5.21.1.x86_64", product: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64", product_id: "vim-small-8.2.5038-150000.5.21.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product: { name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-desktop-applications:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product: { name: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-desktop-applications:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15-LTSS", product: { name: "SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles_bcl:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp2", }, }, }, { category: "product_name", name: "SUSE Manager Proxy 4.1", product: { name: "SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-proxy:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Retail Branch Server 4.1", product: { name: "SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-retail-branch-server:4.1", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.1", product: { name: "SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.1", product: { name: "SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Micro 5.2", product: { name: "SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2", product_identification_helper: { cpe: "cpe:/o:suse:suse-microos:5.2", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 6", product: { name: "SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6", product_identification_helper: { cpe: "cpe:/o:suse:ses:6", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7", product: { name: "SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7", product_identification_helper: { cpe: "cpe:/o:suse:ses:7", }, }, }, { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, { category: "product_name", name: "openSUSE Leap 15.4", product: { name: "openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP4", product_id: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Desktop Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL", product_id: "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-BCL", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL", product_id: "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Proxy 4.1", product_id: "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Proxy 4.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Retail Branch Server 4.1", product_id: "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Retail Branch Server 4.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Manager Server 4.1", product_id: "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", product_id: "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.1", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", product_id: "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Micro 5.2", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Enterprise Storage 6", product_id: "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 6", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of SUSE Enterprise Storage 7", product_id: "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "gvim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "gvim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "gvim-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "gvim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-data-8.2.5038-150000.5.21.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-data-common-8.2.5038-150000.5.21.1.noarch as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", }, product_reference: "vim-data-common-8.2.5038-150000.5.21.1.noarch", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.aarch64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.aarch64", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.ppc64le as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.ppc64le", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.s390x as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.s390x", relates_to_product_reference: "openSUSE Leap 15.4", }, { category: "default_component_of", full_product_name: { name: "vim-small-8.2.5038-150000.5.21.1.x86_64 as component of openSUSE Leap 15.4", product_id: "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", }, product_reference: "vim-small-8.2.5038-150000.5.21.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.4", }, ], }, vulnerabilities: [ { cve: "CVE-2017-17087", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-17087", }, ], notes: [ { category: "general", text: "fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-17087", url: "https://www.suse.com/security/cve/CVE-2017-17087", }, { category: "external", summary: "SUSE Bug 1065958 for CVE-2017-17087", url: "https://bugzilla.suse.com/1065958", }, { category: "external", summary: "SUSE Bug 1070955 for CVE-2017-17087", url: "https://bugzilla.suse.com/1070955", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2017-17087", }, { cve: "CVE-2021-3778", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3778", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3778", url: "https://www.suse.com/security/cve/CVE-2021-3778", }, { category: "external", summary: "SUSE Bug 1190533 for CVE-2021-3778", url: "https://bugzilla.suse.com/1190533", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3796", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3796", url: "https://www.suse.com/security/cve/CVE-2021-3796", }, { category: "external", summary: "SUSE Bug 1190570 for CVE-2021-3796", url: "https://bugzilla.suse.com/1190570", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3796", }, { cve: "CVE-2021-3872", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3872", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3872", url: "https://www.suse.com/security/cve/CVE-2021-3872", }, { category: "external", summary: "SUSE Bug 1191893 for CVE-2021-3872", url: "https://bugzilla.suse.com/1191893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3875", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3875", url: "https://www.suse.com/security/cve/CVE-2021-3875", }, { category: "external", summary: "SUSE Bug 1191770 for CVE-2021-3875", url: "https://bugzilla.suse.com/1191770", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3875", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3903", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3903", url: "https://www.suse.com/security/cve/CVE-2021-3903", }, { category: "external", summary: "SUSE Bug 1192167 for CVE-2021-3903", url: "https://bugzilla.suse.com/1192167", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3903", }, { cve: "CVE-2021-3927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3927", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3927", url: "https://www.suse.com/security/cve/CVE-2021-3927", }, { category: "external", summary: "SUSE Bug 1192481 for CVE-2021-3927", url: "https://bugzilla.suse.com/1192481", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3928", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use of Uninitialized Variable", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3928", url: "https://www.suse.com/security/cve/CVE-2021-3928", }, { category: "external", summary: "SUSE Bug 1192478 for CVE-2021-3928", url: "https://bugzilla.suse.com/1192478", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3968", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3968", url: "https://www.suse.com/security/cve/CVE-2021-3968", }, { category: "external", summary: "SUSE Bug 1192902 for CVE-2021-3968", url: "https://bugzilla.suse.com/1192902", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3968", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3973", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3973", url: "https://www.suse.com/security/cve/CVE-2021-3973", }, { category: "external", summary: "SUSE Bug 1192903 for CVE-2021-3973", url: "https://bugzilla.suse.com/1192903", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3973", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "critical", }, ], title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3974", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3974", url: "https://www.suse.com/security/cve/CVE-2021-3974", }, { category: "external", summary: "SUSE Bug 1192904 for CVE-2021-3974", url: "https://bugzilla.suse.com/1192904", }, { category: "external", summary: "SUSE Bug 1206818 for CVE-2021-3974", url: "https://bugzilla.suse.com/1206818", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-3974", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-3974", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3984", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3984", url: "https://www.suse.com/security/cve/CVE-2021-3984", }, { category: "external", summary: "SUSE Bug 1193298 for CVE-2021-3984", url: "https://bugzilla.suse.com/1193298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4019", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4019", url: "https://www.suse.com/security/cve/CVE-2021-4019", }, { category: "external", summary: "SUSE Bug 1193294 for CVE-2021-4019", url: "https://bugzilla.suse.com/1193294", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-4019", }, { cve: "CVE-2021-4069", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4069", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4069", url: "https://www.suse.com/security/cve/CVE-2021-4069", }, { category: "external", summary: "SUSE Bug 1193466 for CVE-2021-4069", url: "https://bugzilla.suse.com/1193466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-4069", }, { cve: "CVE-2021-4136", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4136", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4136", url: "https://www.suse.com/security/cve/CVE-2021-4136", }, { category: "external", summary: "SUSE Bug 1193905 for CVE-2021-4136", url: "https://bugzilla.suse.com/1193905", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2021-4136", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2021-4136", }, { cve: "CVE-2021-4166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4166", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4166", url: "https://www.suse.com/security/cve/CVE-2021-4166", }, { category: "external", summary: "SUSE Bug 1194093 for CVE-2021-4166", url: "https://bugzilla.suse.com/1194093", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-4166", }, { cve: "CVE-2021-4192", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4192", }, ], notes: [ { category: "general", text: "vim is vulnerable to Use After Free", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4192", url: "https://www.suse.com/security/cve/CVE-2021-4192", }, { category: "external", summary: "SUSE Bug 1194217 for CVE-2021-4192", url: "https://bugzilla.suse.com/1194217", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-4193", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-4193", url: "https://www.suse.com/security/cve/CVE-2021-4193", }, { category: "external", summary: "SUSE Bug 1194216 for CVE-2021-4193", url: "https://bugzilla.suse.com/1194216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2021-4193", }, { cve: "CVE-2021-46059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-46059", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-46059", url: "https://www.suse.com/security/cve/CVE-2021-46059", }, { category: "external", summary: "SUSE Bug 1194556 for CVE-2021-46059", url: "https://bugzilla.suse.com/1194556", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2021-46059", }, { cve: "CVE-2022-0128", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0128", }, ], notes: [ { category: "general", text: "vim is vulnerable to Out-of-bounds Read", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0128", url: "https://www.suse.com/security/cve/CVE-2022-0128", }, { category: "external", summary: "SUSE Bug 1194388 for CVE-2022-0128", url: "https://bugzilla.suse.com/1194388", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-0128", }, { cve: "CVE-2022-0213", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0213", }, ], notes: [ { category: "general", text: "vim is vulnerable to Heap-based Buffer Overflow", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0213", url: "https://www.suse.com/security/cve/CVE-2022-0213", }, { category: "external", summary: "SUSE Bug 1194885 for CVE-2022-0213", url: "https://bugzilla.suse.com/1194885", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0213", }, { cve: "CVE-2022-0261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0261", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0261", url: "https://www.suse.com/security/cve/CVE-2022-0261", }, { category: "external", summary: "SUSE Bug 1194872 for CVE-2022-0261", url: "https://bugzilla.suse.com/1194872", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0318", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0318", url: "https://www.suse.com/security/cve/CVE-2022-0318", }, { category: "external", summary: "SUSE Bug 1195004 for CVE-2022-0318", url: "https://bugzilla.suse.com/1195004", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0319", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0319", url: "https://www.suse.com/security/cve/CVE-2022-0319", }, { category: "external", summary: "SUSE Bug 1195066 for CVE-2022-0319", url: "https://bugzilla.suse.com/1195066", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0351", }, ], notes: [ { category: "general", text: "Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0351", url: "https://www.suse.com/security/cve/CVE-2022-0351", }, { category: "external", summary: "SUSE Bug 1195126 for CVE-2022-0351", url: "https://bugzilla.suse.com/1195126", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0359", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0359", url: "https://www.suse.com/security/cve/CVE-2022-0359", }, { category: "external", summary: "SUSE Bug 1195203 for CVE-2022-0359", url: "https://bugzilla.suse.com/1195203", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0361", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0361", url: "https://www.suse.com/security/cve/CVE-2022-0361", }, { category: "external", summary: "SUSE Bug 1195202 for CVE-2022-0361", url: "https://bugzilla.suse.com/1195202", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0361", }, { cve: "CVE-2022-0392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0392", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0392", url: "https://www.suse.com/security/cve/CVE-2022-0392", }, { category: "external", summary: "SUSE Bug 1195332 for CVE-2022-0392", url: "https://bugzilla.suse.com/1195332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0407", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0407", url: "https://www.suse.com/security/cve/CVE-2022-0407", }, { category: "external", summary: "SUSE Bug 1195354 for CVE-2022-0407", url: "https://bugzilla.suse.com/1195354", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208649 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208649", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0407", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2022-0407", }, { cve: "CVE-2022-0413", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0413", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0413", url: "https://www.suse.com/security/cve/CVE-2022-0413", }, { category: "external", summary: "SUSE Bug 1195356 for CVE-2022-0413", url: "https://bugzilla.suse.com/1195356", }, { category: "external", summary: "SUSE Bug 1208308 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208308", }, { category: "external", summary: "SUSE Bug 1208651 for CVE-2022-0413", url: "https://bugzilla.suse.com/1208651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "important", }, ], title: "CVE-2022-0413", }, { cve: "CVE-2022-0696", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-0696", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-0696", url: "https://www.suse.com/security/cve/CVE-2022-0696", }, { category: "external", summary: "SUSE Bug 1196361 for CVE-2022-0696", url: "https://bugzilla.suse.com/1196361", }, { category: "external", summary: "SUSE Bug 1205395 for CVE-2022-0696", url: "https://bugzilla.suse.com/1205395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-0696", }, { cve: "CVE-2022-1381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1381", }, ], notes: [ { category: "general", text: "global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1381", url: "https://www.suse.com/security/cve/CVE-2022-1381", }, { category: "external", summary: "SUSE Bug 1198596 for CVE-2022-1381", url: "https://bugzilla.suse.com/1198596", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1420", }, ], notes: [ { category: "general", text: "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1420", url: "https://www.suse.com/security/cve/CVE-2022-1420", }, { category: "external", summary: "SUSE Bug 1198748 for CVE-2022-1420", url: "https://bugzilla.suse.com/1198748", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1420", }, { cve: "CVE-2022-1616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1616", }, ], notes: [ { category: "general", text: "Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1616", url: "https://www.suse.com/security/cve/CVE-2022-1616", }, { category: "external", summary: "SUSE Bug 1199331 for CVE-2022-1616", url: "https://bugzilla.suse.com/1199331", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1619", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1619", url: "https://www.suse.com/security/cve/CVE-2022-1619", }, { category: "external", summary: "SUSE Bug 1199333 for CVE-2022-1619", url: "https://bugzilla.suse.com/1199333", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1620", }, ], notes: [ { category: "general", text: "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1620", url: "https://www.suse.com/security/cve/CVE-2022-1620", }, { category: "external", summary: "SUSE Bug 1199334 for CVE-2022-1620", url: "https://bugzilla.suse.com/1199334", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1620", }, { cve: "CVE-2022-1733", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1733", }, ], notes: [ { category: "general", text: "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1733", url: "https://www.suse.com/security/cve/CVE-2022-1733", }, { category: "external", summary: "SUSE Bug 1199655 for CVE-2022-1733", url: "https://bugzilla.suse.com/1199655", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1735", }, ], notes: [ { category: "general", text: "Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1735", url: "https://www.suse.com/security/cve/CVE-2022-1735", }, { category: "external", summary: "SUSE Bug 1199651 for CVE-2022-1735", url: "https://bugzilla.suse.com/1199651", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1735", }, { cve: "CVE-2022-1771", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1771", }, ], notes: [ { category: "general", text: "Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1771", url: "https://www.suse.com/security/cve/CVE-2022-1771", }, { category: "external", summary: "SUSE Bug 1199693 for CVE-2022-1771", url: "https://bugzilla.suse.com/1199693", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1785", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1785", url: "https://www.suse.com/security/cve/CVE-2022-1785", }, { category: "external", summary: "SUSE Bug 1199745 for CVE-2022-1785", url: "https://bugzilla.suse.com/1199745", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1796", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.4979.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1796", url: "https://www.suse.com/security/cve/CVE-2022-1796", }, { category: "external", summary: "SUSE Bug 1199747 for CVE-2022-1796", url: "https://bugzilla.suse.com/1199747", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1851", }, ], notes: [ { category: "general", text: "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1851", url: "https://www.suse.com/security/cve/CVE-2022-1851", }, { category: "external", summary: "SUSE Bug 1199936 for CVE-2022-1851", url: "https://bugzilla.suse.com/1199936", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "low", }, ], title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1897", }, ], notes: [ { category: "general", text: "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1897", url: "https://www.suse.com/security/cve/CVE-2022-1897", }, { category: "external", summary: "SUSE Bug 1200010 for CVE-2022-1897", url: "https://bugzilla.suse.com/1200010", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1898", }, ], notes: [ { category: "general", text: "Use After Free in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1898", url: "https://www.suse.com/security/cve/CVE-2022-1898", }, { category: "external", summary: "SUSE Bug 1200011 for CVE-2022-1898", url: "https://bugzilla.suse.com/1200011", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2022-1927", }, ], notes: [ { category: "general", text: "Buffer Over-read in GitHub repository vim/vim prior to 8.2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2022-1927", url: "https://www.suse.com/security/cve/CVE-2022-1927", }, { category: "external", summary: "SUSE Bug 1200012 for CVE-2022-1927", url: "https://bugzilla.suse.com/1200012", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L", version: "3.1", }, products: [ "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 6:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 6:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 6:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Enterprise Storage 7:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Enterprise Storage 7:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Enterprise Storage 7:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.1:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Micro 5.2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Micro 5.2:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:vim-small-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP3:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP4:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP1-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-BCL:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Proxy 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Proxy 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Retail Branch Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Retail Branch Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:gvim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.ppc64le", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.s390x", "SUSE Manager Server 4.1:vim-8.2.5038-150000.5.21.1.x86_64", "SUSE Manager Server 4.1:vim-data-8.2.5038-150000.5.21.1.noarch", "SUSE Manager Server 4.1:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.3:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.3:vim-small-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:gvim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-8.2.5038-150000.5.21.1.x86_64", "openSUSE Leap 15.4:vim-data-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-data-common-8.2.5038-150000.5.21.1.noarch", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.aarch64", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.ppc64le", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.s390x", "openSUSE Leap 15.4:vim-small-8.2.5038-150000.5.21.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2022-06-16T13:18:54Z", details: "moderate", }, ], title: "CVE-2022-1927", }, ], }
var-202112-1669
Vulnerability from variot
vim is vulnerable to Heap-based Buffer Overflow. vim Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Vim is an editor based on the UNIX platform. No detailed vulnerability details are currently available. A possible heap-based buffer overflow could allow an malicious user to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2021-3927) A flaw was found in vim. A possible stack-based buffer overflow could allow an malicious user to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2021-3928) A flaw was found in vim. A possible heap use-after-free vulnerability could allow an malicious user to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to system availability. (CVE-2021-3968) A flaw was found in vim. A possible heap-based buffer overflow could allow an malicious user to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to system availability. (CVE-2021-3973) A flaw was found in vim. A possible use-after-free vulnerability could allow an malicious user to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to system availability. (CVE-2021-3974) A flaw was found in vim. A possible heap-based buffer overflow allows an malicious user to input a specially crafted file, leading to a crash or code execution. The highest threat from this vulnerability is confidentiality, integrity, and system availability. (CVE-2021-3984) A flaw was found in vim. A possible heap-based buffer overflow vulnerability allows an malicious user to input a specially crafted file, leading to a crash or code execution. The highest threat from this vulnerability is system availability. A possible heap-based buffer overflow could allow an malicious user to input a specially crafted file leading to a crash or code execution. (CVE-2021-4136) A flaw was found in vim. A possible heap-based buffer overflow could allow an malicious user to input a specially crafted file leading to a crash or code execution. (CVE-2021-4166) A flaw was found in vim. A possible use after free vulnerability could allow an malicious user to input a specially crafted file leading to a crash or code execution. (CVE-2021-4173) A flaw was found in vim. A possible use after free vulnerability could allow an malicious user to input a specially crafted file leading to a crash or code execution. Sourcing a specially crafted file in vim could crash the vim process or possibly lead to other undefined behaviors. A specially crafted file could be used to, when opened in vim, disclose some of the process's internal memory. (CVE-2021-4193) References to CVE-2021-4192 and CVE-2021-4193 have been added after the original release of this advisory, however those vulnerabilities were fixed by the packages referenced by this advisory's initial release on 2022-01-18. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2022-03-14-4 macOS Monterey 12.3
macOS Monterey 12.3 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213183.
Accelerate Framework Available for: macOS Monterey Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed with improved state management. CVE-2022-22633: an anonymous researcher
AMD Available for: macOS Monterey Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2022-22669: an anonymous researcher
AppKit Available for: macOS Monterey Impact: A malicious application may be able to gain root privileges Description: A logic issue was addressed with improved validation. CVE-2022-22665: Lockheed Martin Red Team
AppleGraphicsControl Available for: macOS Monterey Impact: An application may be able to gain elevated privileges Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2022-22631: an anonymous researcher
AppleScript Available for: macOS Monterey Impact: Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2022-22625: Mickey Jin (@patch1t) of Trend Micro
AppleScript Available for: macOS Monterey Impact: An application may be able to read restricted memory Description: This issue was addressed with improved checks. CVE-2022-22648: an anonymous researcher
AppleScript Available for: macOS Monterey Impact: Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2022-22626: Mickey Jin (@patch1t) of Trend Micro CVE-2022-22627: Qi Sun and Robert Ai of Trend Micro
AppleScript Available for: macOS Monterey Impact: Processing a maliciously crafted file may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved validation. CVE-2022-22597: Qi Sun and Robert Ai of Trend Micro
BOM Available for: macOS Monterey Impact: A maliciously crafted ZIP archive may bypass Gatekeeper checks Description: This issue was addressed with improved checks. CVE-2022-22616: Ferdous Saljooki (@malwarezoo) and Jaron Bradley (@jbradley89) of Jamf Software, Mickey Jin (@patch1t)
curl Available for: macOS Monterey Impact: Multiple issues in curl Description: Multiple issues were addressed by updating to curl version 7.79.1. CVE-2021-22946 CVE-2021-22947 CVE-2021-22945 CVE-2022-22623
FaceTime Available for: macOS Monterey Impact: A user may send audio and video in a FaceTime call without knowing that they have done so Description: This issue was addressed with improved checks. CVE-2022-22643: Sonali Luthar of the University of Virginia, Michael Liao of the University of Illinois at Urbana-Champaign, Rohan Pahwa of Rutgers University, and Bao Nguyen of the University of Florida
ImageIO Available for: macOS Monterey Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2022-22611: Xingyu Jin of Google
ImageIO Available for: macOS Monterey Impact: Processing a maliciously crafted image may lead to heap corruption Description: A memory consumption issue was addressed with improved memory handling. CVE-2022-22612: Xingyu Jin of Google
Intel Graphics Driver Available for: macOS Monterey Impact: An application may be able to execute arbitrary code with kernel privileges Description: A type confusion issue was addressed with improved state handling. CVE-2022-22661: an anonymous researcher, Peterpan0927 of Alibaba Security Pandora Lab
IOGPUFamily Available for: macOS Monterey Impact: An application may be able to gain elevated privileges Description: A use after free issue was addressed with improved memory management. CVE-2022-22641: Mohamed Ghannam (@_simo36)
Kernel Available for: macOS Monterey Impact: An application may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2022-22613: Alex, an anonymous researcher
Kernel Available for: macOS Monterey Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2022-22614: an anonymous researcher CVE-2022-22615: an anonymous researcher
Kernel Available for: macOS Monterey Impact: A malicious application may be able to elevate privileges Description: A logic issue was addressed with improved state management. CVE-2022-22632: Keegan Saunders
Kernel Available for: macOS Monterey Impact: An attacker in a privileged position may be able to perform a denial of service attack Description: A null pointer dereference was addressed with improved validation. CVE-2022-22638: derrek (@derrekr6)
Kernel Available for: macOS Monterey Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved validation. CVE-2022-22640: sqrtpwn
libarchive Available for: macOS Monterey Impact: Multiple issues in libarchive Description: Multiple memory corruption issues existed in libarchive. These issues were addressed with improved input validation. CVE-2021-36976
Login Window Available for: macOS Monterey Impact: A person with access to a Mac may be able to bypass Login Window Description: This issue was addressed with improved checks. CVE-2022-22647: an anonymous researcher
LoginWindow Available for: macOS Monterey Impact: A local attacker may be able to view the previous logged in user’s desktop from the fast user switching screen Description: An authentication issue was addressed with improved state management. CVE-2022-22656
GarageBand MIDI Available for: macOS Monterey Impact: Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution Description: A memory initialization issue was addressed with improved memory handling. CVE-2022-22657: Brandon Perry of Atredis Partners
GarageBand MIDI Available for: macOS Monterey Impact: Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2022-22664: Brandon Perry of Atredis Partners
NSSpellChecker Available for: macOS Monterey Impact: A malicious application may be able to access information about a user's contacts Description: A privacy issue existed in the handling of Contact cards. This was addressed with improved state management. CVE-2022-22644: an anonymous researcher
PackageKit Available for: macOS Monterey Impact: An application may be able to gain elevated privileges Description: A logic issue was addressed with improved state management. CVE-2022-22617: Mickey Jin (@patch1t)
Preferences Available for: macOS Monterey Impact: A malicious application may be able to read other applications' settings Description: The issue was addressed with additional permissions checks. CVE-2022-22609: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020) of Tencent Security Xuanwu Lab (xlab.tencent.com)
QuickTime Player Available for: macOS Monterey Impact: A plug-in may be able to inherit the application's permissions and access user data Description: This issue was addressed with improved checks. CVE-2022-22650: Wojciech Reguła (@_r3ggi) of SecuRing
Safari Downloads Available for: macOS Monterey Impact: A maliciously crafted ZIP archive may bypass Gatekeeper checks Description: This issue was addressed with improved checks. CVE-2022-22616: Ferdous Saljooki (@malwarezoo) and Jaron Bradley (@jbradley89) of Jamf Software, Mickey Jin (@patch1t)
Sandbox Available for: macOS Monterey Impact: A malicious application may be able to bypass certain Privacy preferences Description: The issue was addressed with improved permissions logic. CVE-2022-22600: Sudhakar Muthumani of Primefort Private Limited, Khiem Tran
Siri Available for: macOS Monterey Impact: A person with physical access to a device may be able to use Siri to obtain some location information from the lock screen Description: A permissions issue was addressed with improved validation. CVE-2022-22599: Andrew Goldberg of the University of Texas at Austin, McCombs School of Business (linkedin.com/andrew-goldberg/)
SMB Available for: macOS Monterey Impact: A remote attacker may be able to cause unexpected system termination or corrupt kernel memory Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2022-22651: Felix Poulin-Belanger
SoftwareUpdate Available for: macOS Monterey Impact: An application may be able to gain elevated privileges Description: A logic issue was addressed with improved state management. CVE-2022-22639: Mickey Jin (@patch1t)
System Preferences Available for: macOS Monterey Impact: An app may be able to spoof system notifications and UI Description: This issue was addressed with a new entitlement. CVE-2022-22660: Guilherme Rambo of Best Buddy Apps (rambo.codes)
UIKit Available for: macOS Monterey Impact: A person with physical access to an iOS device may be able to see sensitive information via keyboard suggestions Description: This issue was addressed with improved checks. CVE-2022-22621: Joey Hewitt
Vim Available for: macOS Monterey Impact: Multiple issues in Vim Description: Multiple issues were addressed by updating Vim. CVE-2021-4136 CVE-2021-4166 CVE-2021-4173 CVE-2021-4187 CVE-2021-4192 CVE-2021-4193 CVE-2021-46059 CVE-2022-0128 CVE-2022-0156 CVE-2022-0158
VoiceOver Available for: macOS Monterey Impact: A user may be able to view restricted content from the lock screen Description: A lock screen issue was addressed with improved state management. CVE-2021-30918: an anonymous researcher
WebKit Available for: macOS Monterey Impact: Processing maliciously crafted web content may disclose sensitive user information Description: A cookie management issue was addressed with improved state management. WebKit Bugzilla: 232748 CVE-2022-22662: Prakash (@1lastBr3ath) of Threat Nix
WebKit Available for: macOS Monterey Impact: Processing maliciously crafted web content may lead to code execution Description: A memory corruption issue was addressed with improved state management. WebKit Bugzilla: 232812 CVE-2022-22610: Quan Yin of Bigo Technology Live Client Team
WebKit Available for: macOS Monterey Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. WebKit Bugzilla: 233172 CVE-2022-22624: Kirin (@Pwnrin) of Tencent Security Xuanwu Lab WebKit Bugzilla: 234147 CVE-2022-22628: Kirin (@Pwnrin) of Tencent Security Xuanwu Lab
WebKit Available for: macOS Monterey Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A buffer overflow issue was addressed with improved memory handling. WebKit Bugzilla: 234966 CVE-2022-22629: Jeonghoon Shin at Theori working with Trend Micro Zero Day Initiative
WebKit Available for: macOS Monterey Impact: A malicious website may cause unexpected cross-origin behavior Description: A logic issue was addressed with improved state management. WebKit Bugzilla: 235294 CVE-2022-22637: Tom McKee of Google
Wi-Fi Available for: macOS Monterey Impact: A malicious application may be able to leak sensitive user information Description: A logic issue was addressed with improved restrictions. CVE-2022-22668: MrPhil17
xar Available for: macOS Monterey Impact: A local user may be able to write arbitrary files Description: A validation issue existed in the handling of symlinks. This issue was addressed with improved validation of symlinks. CVE-2022-22582: Richard Warren of NCC Group
Additional recognition
AirDrop We would like to acknowledge Omar Espino (omespino.com), Ron Masas of BreakPoint.sh for their assistance.
Bluetooth We would like to acknowledge an anonymous researcher, chenyuwang (@mzzzz__) of Tencent Security Xuanwu Lab for their assistance.
Face Gallery We would like to acknowledge Tian Zhang (@KhaosT) for their assistance.
Intel Graphics Driver We would like to acknowledge Jack Dates of RET2 Systems, Inc., Yinyi Wu (@3ndy1) for their assistance.
Local Authentication We would like to acknowledge an anonymous researcher for their assistance.
Notes We would like to acknowledge Nathaniel Ekoniak of Ennate Technologies for their assistance.
Password Manager We would like to acknowledge Maximilian Golla (@m33x) of Max Planck Institute for Security and Privacy (MPI-SP) for their assistance.
Siri We would like to acknowledge an anonymous researcher for their assistance.
syslog We would like to acknowledge Yonghwi Jin (@jinmo123) of Theori for their assistance.
TCC We would like to acknowledge Csaba Fitzl (@theevilbit) of Offensive Security for their assistance.
UIKit We would like to acknowledge Tim Shadel of Day Logger, Inc. for their assistance.
WebKit We would like to acknowledge Abdullah Md Shaleh for their assistance.
WebKit Storage We would like to acknowledge Martin Bajanik of FingerprintJS for their assistance.
macOS Monterey 12.3 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ All information is also posted on the Apple Security Updates web site: https://support.apple.com/en-us/HT201222.
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEePiLW1MrMjw19XzoeC9qKD1prhgFAmIv0O4ACgkQeC9qKD1p rhjGGRAAjqIyEzN+LAk+2uzHIMQNEwav9fqo/ZNoYAOzNgActK56PIC/PBM3SzHd LrGFKbBq/EMU4EqXT6ycB7/uZfaAZVCBDNo1qOoYNHXnKtGL2Z/96mV14qbSmRvC jfg1pC0G1jPTxJKvHhuQSZHDGj+BI458fwuTY48kjCnzlWf9dKr2kdjUjE38X9RM 0upKVKqY+oWdbn5jPwgZ408NOqzHrHDW1iIYd4v9UrKN3pfMGDzVZTr/offL6VFL osOVWv1IZvXrhPsrtd2KfG0hTHz71vShVZ7jGAsGEdC/mT79zwFbYuzBFy791xFa rizr/ZWGfWBSYy8O90d1l13lDlE739YPc/dt1mjcvP9FTnzMwBagy+6//zAVe0v/ KZOjmvtK5sRvrQH54E8qTYitdMpY2aZhfT6D8tcl+98TjxTDNXXj/gypdCXNWqyB L1PtFhTjQ0WnzUNB7sosM0zAjfZ1iPAZq0XHDQ6p6gEdVavNOHo/ekgibVm5f1pi kwBHkKyq55QbzipDWwXl6Owk/iaHPxgENYb78BpeUQSFei+IYDUsyLkPh3L95PHZ JSyKOtbBArlYOWcxlYHn+hDK8iotA1c/SHDefYOoNkp1uP853Ge09eWq+zMzUwEo GXXJYMi1Q8gmJ9wK/A3d/FKY4FBZxpByUUgjYhiMKTU5cSeihaI= =RiA+ -----END PGP SIGNATURE-----
. Apple is aware of a report that this issue may have been actively exploited. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202208-32
https://security.gentoo.org/
Severity: Low Title: Vim, gVim: Multiple Vulnerabilities Date: August 21, 2022 Bugs: #811870, #818562, #819528, #823473, #824930, #828583, #829658, #830106, #830994, #833572, #836432, #851231 ID: 202208-32
Synopsis
Multiple vulnerabilities have been discovered in Vim, the worst of which could result in denial of service.
Background
Vim is an efficient, highly configurable improved version of the classic ‘vi’ text editor. gVim is the GUI version of Vim.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-editors/gvim < 9.0.0060 >= 9.0.0060 2 app-editors/vim < 9.0.0060 >= 9.0.0060 3 app-editors/vim-core < 9.0.0060 >= 9.0.0060
Description
Multiple vulnerabilities have been discovered in Vim and gVim. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All Vim users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-editors/vim-9.0.0060"
All gVim users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-editors/gvim-9.0.0060"
All vim-core users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-editors/vim-core-9.0.0060"
References
[ 1 ] CVE-2021-3770 https://nvd.nist.gov/vuln/detail/CVE-2021-3770 [ 2 ] CVE-2021-3778 https://nvd.nist.gov/vuln/detail/CVE-2021-3778 [ 3 ] CVE-2021-3796 https://nvd.nist.gov/vuln/detail/CVE-2021-3796 [ 4 ] CVE-2021-3872 https://nvd.nist.gov/vuln/detail/CVE-2021-3872 [ 5 ] CVE-2021-3875 https://nvd.nist.gov/vuln/detail/CVE-2021-3875 [ 6 ] CVE-2021-3927 https://nvd.nist.gov/vuln/detail/CVE-2021-3927 [ 7 ] CVE-2021-3928 https://nvd.nist.gov/vuln/detail/CVE-2021-3928 [ 8 ] CVE-2021-3968 https://nvd.nist.gov/vuln/detail/CVE-2021-3968 [ 9 ] CVE-2021-3973 https://nvd.nist.gov/vuln/detail/CVE-2021-3973 [ 10 ] CVE-2021-3974 https://nvd.nist.gov/vuln/detail/CVE-2021-3974 [ 11 ] CVE-2021-3984 https://nvd.nist.gov/vuln/detail/CVE-2021-3984 [ 12 ] CVE-2021-4019 https://nvd.nist.gov/vuln/detail/CVE-2021-4019 [ 13 ] CVE-2021-4069 https://nvd.nist.gov/vuln/detail/CVE-2021-4069 [ 14 ] CVE-2021-4136 https://nvd.nist.gov/vuln/detail/CVE-2021-4136 [ 15 ] CVE-2021-4166 https://nvd.nist.gov/vuln/detail/CVE-2021-4166 [ 16 ] CVE-2021-4173 https://nvd.nist.gov/vuln/detail/CVE-2021-4173 [ 17 ] CVE-2021-4187 https://nvd.nist.gov/vuln/detail/CVE-2021-4187 [ 18 ] CVE-2021-4192 https://nvd.nist.gov/vuln/detail/CVE-2021-4192 [ 19 ] CVE-2021-4193 https://nvd.nist.gov/vuln/detail/CVE-2021-4193 [ 20 ] CVE-2021-46059 https://nvd.nist.gov/vuln/detail/CVE-2021-46059 [ 21 ] CVE-2022-0128 https://nvd.nist.gov/vuln/detail/CVE-2022-0128 [ 22 ] CVE-2022-0156 https://nvd.nist.gov/vuln/detail/CVE-2022-0156 [ 23 ] CVE-2022-0158 https://nvd.nist.gov/vuln/detail/CVE-2022-0158 [ 24 ] CVE-2022-0213 https://nvd.nist.gov/vuln/detail/CVE-2022-0213 [ 25 ] CVE-2022-0261 https://nvd.nist.gov/vuln/detail/CVE-2022-0261 [ 26 ] CVE-2022-0318 https://nvd.nist.gov/vuln/detail/CVE-2022-0318 [ 27 ] CVE-2022-0319 https://nvd.nist.gov/vuln/detail/CVE-2022-0319 [ 28 ] CVE-2022-0351 https://nvd.nist.gov/vuln/detail/CVE-2022-0351 [ 29 ] CVE-2022-0359 https://nvd.nist.gov/vuln/detail/CVE-2022-0359 [ 30 ] CVE-2022-0361 https://nvd.nist.gov/vuln/detail/CVE-2022-0361 [ 31 ] CVE-2022-0368 https://nvd.nist.gov/vuln/detail/CVE-2022-0368 [ 32 ] CVE-2022-0392 https://nvd.nist.gov/vuln/detail/CVE-2022-0392 [ 33 ] CVE-2022-0393 https://nvd.nist.gov/vuln/detail/CVE-2022-0393 [ 34 ] CVE-2022-0407 https://nvd.nist.gov/vuln/detail/CVE-2022-0407 [ 35 ] CVE-2022-0408 https://nvd.nist.gov/vuln/detail/CVE-2022-0408 [ 36 ] CVE-2022-0413 https://nvd.nist.gov/vuln/detail/CVE-2022-0413 [ 37 ] CVE-2022-0417 https://nvd.nist.gov/vuln/detail/CVE-2022-0417 [ 38 ] CVE-2022-0443 https://nvd.nist.gov/vuln/detail/CVE-2022-0443 [ 39 ] CVE-2022-0554 https://nvd.nist.gov/vuln/detail/CVE-2022-0554 [ 40 ] CVE-2022-0629 https://nvd.nist.gov/vuln/detail/CVE-2022-0629 [ 41 ] CVE-2022-0685 https://nvd.nist.gov/vuln/detail/CVE-2022-0685 [ 42 ] CVE-2022-0714 https://nvd.nist.gov/vuln/detail/CVE-2022-0714 [ 43 ] CVE-2022-0729 https://nvd.nist.gov/vuln/detail/CVE-2022-0729 [ 44 ] CVE-2022-0943 https://nvd.nist.gov/vuln/detail/CVE-2022-0943 [ 45 ] CVE-2022-1154 https://nvd.nist.gov/vuln/detail/CVE-2022-1154 [ 46 ] CVE-2022-1160 https://nvd.nist.gov/vuln/detail/CVE-2022-1160 [ 47 ] CVE-2022-1381 https://nvd.nist.gov/vuln/detail/CVE-2022-1381 [ 48 ] CVE-2022-1420 https://nvd.nist.gov/vuln/detail/CVE-2022-1420 [ 49 ] CVE-2022-1616 https://nvd.nist.gov/vuln/detail/CVE-2022-1616 [ 50 ] CVE-2022-1619 https://nvd.nist.gov/vuln/detail/CVE-2022-1619 [ 51 ] CVE-2022-1620 https://nvd.nist.gov/vuln/detail/CVE-2022-1620 [ 52 ] CVE-2022-1621 https://nvd.nist.gov/vuln/detail/CVE-2022-1621 [ 53 ] CVE-2022-1629 https://nvd.nist.gov/vuln/detail/CVE-2022-1629 [ 54 ] CVE-2022-1674 https://nvd.nist.gov/vuln/detail/CVE-2022-1674 [ 55 ] CVE-2022-1720 https://nvd.nist.gov/vuln/detail/CVE-2022-1720 [ 56 ] CVE-2022-1733 https://nvd.nist.gov/vuln/detail/CVE-2022-1733 [ 57 ] CVE-2022-1735 https://nvd.nist.gov/vuln/detail/CVE-2022-1735 [ 58 ] CVE-2022-1769 https://nvd.nist.gov/vuln/detail/CVE-2022-1769 [ 59 ] CVE-2022-1771 https://nvd.nist.gov/vuln/detail/CVE-2022-1771 [ 60 ] CVE-2022-1785 https://nvd.nist.gov/vuln/detail/CVE-2022-1785 [ 61 ] CVE-2022-1796 https://nvd.nist.gov/vuln/detail/CVE-2022-1796 [ 62 ] CVE-2022-1851 https://nvd.nist.gov/vuln/detail/CVE-2022-1851 [ 63 ] CVE-2022-1886 https://nvd.nist.gov/vuln/detail/CVE-2022-1886 [ 64 ] CVE-2022-1897 https://nvd.nist.gov/vuln/detail/CVE-2022-1897 [ 65 ] CVE-2022-1898 https://nvd.nist.gov/vuln/detail/CVE-2022-1898 [ 66 ] CVE-2022-1927 https://nvd.nist.gov/vuln/detail/CVE-2022-1927 [ 67 ] CVE-2022-1942 https://nvd.nist.gov/vuln/detail/CVE-2022-1942 [ 68 ] CVE-2022-1968 https://nvd.nist.gov/vuln/detail/CVE-2022-1968 [ 69 ] CVE-2022-2000 https://nvd.nist.gov/vuln/detail/CVE-2022-2000 [ 70 ] CVE-2022-2042 https://nvd.nist.gov/vuln/detail/CVE-2022-2042 [ 71 ] CVE-2022-2124 https://nvd.nist.gov/vuln/detail/CVE-2022-2124 [ 72 ] CVE-2022-2125 https://nvd.nist.gov/vuln/detail/CVE-2022-2125 [ 73 ] CVE-2022-2126 https://nvd.nist.gov/vuln/detail/CVE-2022-2126 [ 74 ] CVE-2022-2129 https://nvd.nist.gov/vuln/detail/CVE-2022-2129 [ 75 ] CVE-2022-2175 https://nvd.nist.gov/vuln/detail/CVE-2022-2175 [ 76 ] CVE-2022-2182 https://nvd.nist.gov/vuln/detail/CVE-2022-2182 [ 77 ] CVE-2022-2183 https://nvd.nist.gov/vuln/detail/CVE-2022-2183 [ 78 ] CVE-2022-2206 https://nvd.nist.gov/vuln/detail/CVE-2022-2206 [ 79 ] CVE-2022-2207 https://nvd.nist.gov/vuln/detail/CVE-2022-2207 [ 80 ] CVE-2022-2208 https://nvd.nist.gov/vuln/detail/CVE-2022-2208 [ 81 ] CVE-2022-2210 https://nvd.nist.gov/vuln/detail/CVE-2022-2210 [ 82 ] CVE-2022-2231 https://nvd.nist.gov/vuln/detail/CVE-2022-2231 [ 83 ] CVE-2022-2257 https://nvd.nist.gov/vuln/detail/CVE-2022-2257 [ 84 ] CVE-2022-2264 https://nvd.nist.gov/vuln/detail/CVE-2022-2264 [ 85 ] CVE-2022-2284 https://nvd.nist.gov/vuln/detail/CVE-2022-2284 [ 86 ] CVE-2022-2285 https://nvd.nist.gov/vuln/detail/CVE-2022-2285 [ 87 ] CVE-2022-2286 https://nvd.nist.gov/vuln/detail/CVE-2022-2286 [ 88 ] CVE-2022-2287 https://nvd.nist.gov/vuln/detail/CVE-2022-2287 [ 89 ] CVE-2022-2288 https://nvd.nist.gov/vuln/detail/CVE-2022-2288 [ 90 ] CVE-2022-2289 https://nvd.nist.gov/vuln/detail/CVE-2022-2289 [ 91 ] CVE-2022-2304 https://nvd.nist.gov/vuln/detail/CVE-2022-2304 [ 92 ] CVE-2022-2343 https://nvd.nist.gov/vuln/detail/CVE-2022-2343 [ 93 ] CVE-2022-2344 https://nvd.nist.gov/vuln/detail/CVE-2022-2344 [ 94 ] CVE-2022-2345 https://nvd.nist.gov/vuln/detail/CVE-2022-2345
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202208-32
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5 . CVE-2022-32787: Dohyun Lee (@l33d0hyun) of SSD Secure Disclosure Labs & DNSLab, Korea Univ. CVE-2022-32812: Yinyi Wu (@3ndy1), ABC Research s.r.o
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-1669", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "mac os x", scope: "eq", trust: 1, vendor: "apple", version: "10.15.7", }, { model: "vim", scope: "lt", trust: 1, vendor: "vim", version: "8.2.3847", }, { model: "mac os x", scope: "gte", trust: 1, vendor: "apple", version: "10.15", }, { model: "mac os x", scope: "lt", trust: 1, vendor: "apple", version: "10.15.7", }, { model: "fedora", scope: "eq", trust: 1, vendor: "fedoraproject", version: "34", }, { model: "macos", scope: "lt", trust: 1, vendor: "apple", version: "12.3", }, { model: "fedora", scope: "eq", trust: 1, vendor: "fedoraproject", version: "35", }, { model: "macos", scope: "gte", trust: 1, vendor: "apple", version: "11.0", }, { model: "macos", scope: "lt", trust: 1, vendor: "apple", version: "11.6.6", }, { model: "macos", scope: "gte", trust: 1, vendor: "apple", version: "12.0", }, { model: "macos", scope: null, trust: 0.8, vendor: "アップル", version: null, }, { model: "apple mac os x", scope: null, trust: 0.8, vendor: "アップル", version: null, }, { model: "fedora", scope: null, trust: 0.8, vendor: "fedora", version: null, }, { model: "vim", scope: null, trust: 0.8, vendor: "vim", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-016868", }, { db: "NVD", id: "CVE-2021-4136", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.2.3847", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.15.7", versionStartIncluding: "10.15", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "12.3", versionStartIncluding: "12.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "11.6.6", versionStartIncluding: "11.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-004:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2021-4136", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Apple", sources: [ { db: "PACKETSTORM", id: "166319", }, { db: "PACKETSTORM", id: "167188", }, { db: "PACKETSTORM", id: "167789", }, ], trust: 0.3, }, cve: "CVE-2021-4136", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 8.6, impactScore: 6.4, integrityImpact: "PARTIAL", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: true, vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Medium", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 6.8, confidentialityImpact: "Partial", exploitabilityScore: null, id: "CVE-2021-4136", impactScore: null, integrityImpact: "Partial", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.9, userInteractionRequired: null, vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 8.6, id: "VHN-408692", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:M/AU:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "LOW", attackVector: "LOCAL", author: "security@huntr.dev", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, impactScore: 5.5, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", version: "3.0", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "High", baseScore: 7.8, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2021-4136", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "Required", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2021-4136", trust: 1.8, value: "HIGH", }, { author: "security@huntr.dev", id: "CVE-2021-4136", trust: 1, value: "HIGH", }, { author: "CNNVD", id: "CNNVD-202112-1496", trust: 0.6, value: "HIGH", }, { author: "VULHUB", id: "VHN-408692", trust: 0.1, value: "MEDIUM", }, { author: "VULMON", id: "CVE-2021-4136", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "VULHUB", id: "VHN-408692", }, { db: "VULMON", id: "CVE-2021-4136", }, { db: "JVNDB", id: "JVNDB-2021-016868", }, { db: "NVD", id: "CVE-2021-4136", }, { db: "NVD", id: "CVE-2021-4136", }, { db: "CNNVD", id: "CNNVD-202112-1496", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "vim is vulnerable to Heap-based Buffer Overflow. vim Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Vim is an editor based on the UNIX platform. No detailed vulnerability details are currently available. A possible heap-based buffer overflow could allow an malicious user to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2021-3927)\nA flaw was found in vim. A possible stack-based buffer overflow could allow an malicious user to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2021-3928)\nA flaw was found in vim. A possible heap use-after-free vulnerability could allow an malicious user to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to system availability. (CVE-2021-3968)\nA flaw was found in vim. A possible heap-based buffer overflow could allow an malicious user to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to system availability. (CVE-2021-3973)\nA flaw was found in vim. A possible use-after-free vulnerability could allow an malicious user to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to system availability. (CVE-2021-3974)\nA flaw was found in vim. A possible heap-based buffer overflow allows an malicious user to input a specially crafted file, leading to a crash or code execution. The highest threat from this vulnerability is confidentiality, integrity, and system availability. (CVE-2021-3984)\nA flaw was found in vim. A possible heap-based buffer overflow vulnerability allows an malicious user to input a specially crafted file, leading to a crash or code execution. The highest threat from this vulnerability is system availability. A possible heap-based buffer overflow could allow an malicious user to input a specially crafted file leading to a crash or code execution. (CVE-2021-4136)\nA flaw was found in vim. A possible heap-based buffer overflow could allow an malicious user to input a specially crafted file leading to a crash or code execution. (CVE-2021-4166)\nA flaw was found in vim. A possible use after free vulnerability could allow an malicious user to input a specially crafted file leading to a crash or code execution. (CVE-2021-4173)\nA flaw was found in vim. A possible use after free vulnerability could allow an malicious user to input a specially crafted file leading to a crash or code execution. Sourcing a specially crafted file in vim could crash the vim process or possibly lead to other undefined behaviors. A specially crafted file could be used to, when opened in vim, disclose some of the process's internal memory. (CVE-2021-4193)\nReferences to CVE-2021-4192 and CVE-2021-4193 have been added after the original release of this advisory, however those vulnerabilities were fixed by the packages referenced by this advisory's initial release on 2022-01-18. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2022-03-14-4 macOS Monterey 12.3\n\nmacOS Monterey 12.3 addresses the following issues. \nInformation about the security content is also available at\nhttps://support.apple.com/HT213183. \n\nAccelerate Framework\nAvailable for: macOS Monterey\nImpact: Opening a maliciously crafted PDF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue was addressed with improved\nstate management. \nCVE-2022-22633: an anonymous researcher\n\nAMD\nAvailable for: macOS Monterey\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2022-22669: an anonymous researcher\n\nAppKit\nAvailable for: macOS Monterey\nImpact: A malicious application may be able to gain root privileges\nDescription: A logic issue was addressed with improved validation. \nCVE-2022-22665: Lockheed Martin Red Team\n\nAppleGraphicsControl\nAvailable for: macOS Monterey\nImpact: An application may be able to gain elevated privileges\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2022-22631: an anonymous researcher\n\nAppleScript\nAvailable for: macOS Monterey\nImpact: Processing a maliciously crafted AppleScript binary may\nresult in unexpected application termination or disclosure of process\nmemory\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2022-22625: Mickey Jin (@patch1t) of Trend Micro\n\nAppleScript\nAvailable for: macOS Monterey\nImpact: An application may be able to read restricted memory\nDescription: This issue was addressed with improved checks. \nCVE-2022-22648: an anonymous researcher\n\nAppleScript\nAvailable for: macOS Monterey\nImpact: Processing a maliciously crafted AppleScript binary may\nresult in unexpected application termination or disclosure of process\nmemory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2022-22626: Mickey Jin (@patch1t) of Trend Micro\nCVE-2022-22627: Qi Sun and Robert Ai of Trend Micro\n\nAppleScript\nAvailable for: macOS Monterey\nImpact: Processing a maliciously crafted file may lead to arbitrary\ncode execution\nDescription: A memory corruption issue was addressed with improved\nvalidation. \nCVE-2022-22597: Qi Sun and Robert Ai of Trend Micro\n\nBOM\nAvailable for: macOS Monterey\nImpact: A maliciously crafted ZIP archive may bypass Gatekeeper\nchecks\nDescription: This issue was addressed with improved checks. \nCVE-2022-22616: Ferdous Saljooki (@malwarezoo) and Jaron Bradley\n(@jbradley89) of Jamf Software, Mickey Jin (@patch1t)\n\ncurl\nAvailable for: macOS Monterey\nImpact: Multiple issues in curl\nDescription: Multiple issues were addressed by updating to curl\nversion 7.79.1. \nCVE-2021-22946\nCVE-2021-22947\nCVE-2021-22945\nCVE-2022-22623\n\nFaceTime\nAvailable for: macOS Monterey\nImpact: A user may send audio and video in a FaceTime call without\nknowing that they have done so\nDescription: This issue was addressed with improved checks. \nCVE-2022-22643: Sonali Luthar of the University of Virginia, Michael\nLiao of the University of Illinois at Urbana-Champaign, Rohan Pahwa\nof Rutgers University, and Bao Nguyen of the University of Florida\n\nImageIO\nAvailable for: macOS Monterey\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2022-22611: Xingyu Jin of Google\n\nImageIO\nAvailable for: macOS Monterey\nImpact: Processing a maliciously crafted image may lead to heap\ncorruption\nDescription: A memory consumption issue was addressed with improved\nmemory handling. \nCVE-2022-22612: Xingyu Jin of Google\n\nIntel Graphics Driver\nAvailable for: macOS Monterey\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A type confusion issue was addressed with improved state\nhandling. \nCVE-2022-22661: an anonymous researcher, Peterpan0927 of Alibaba\nSecurity Pandora Lab\n\nIOGPUFamily\nAvailable for: macOS Monterey\nImpact: An application may be able to gain elevated privileges\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2022-22641: Mohamed Ghannam (@_simo36)\n\nKernel\nAvailable for: macOS Monterey\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2022-22613: Alex, an anonymous researcher\n\nKernel\nAvailable for: macOS Monterey\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2022-22614: an anonymous researcher\nCVE-2022-22615: an anonymous researcher\n\nKernel\nAvailable for: macOS Monterey\nImpact: A malicious application may be able to elevate privileges\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2022-22632: Keegan Saunders\n\nKernel\nAvailable for: macOS Monterey\nImpact: An attacker in a privileged position may be able to perform a\ndenial of service attack\nDescription: A null pointer dereference was addressed with improved\nvalidation. \nCVE-2022-22638: derrek (@derrekr6)\n\nKernel\nAvailable for: macOS Monterey\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nvalidation. \nCVE-2022-22640: sqrtpwn\n\nlibarchive\nAvailable for: macOS Monterey\nImpact: Multiple issues in libarchive\nDescription: Multiple memory corruption issues existed in libarchive. \nThese issues were addressed with improved input validation. \nCVE-2021-36976\n\nLogin Window\nAvailable for: macOS Monterey\nImpact: A person with access to a Mac may be able to bypass Login\nWindow\nDescription: This issue was addressed with improved checks. \nCVE-2022-22647: an anonymous researcher\n\nLoginWindow\nAvailable for: macOS Monterey\nImpact: A local attacker may be able to view the previous logged in\nuser’s desktop from the fast user switching screen\nDescription: An authentication issue was addressed with improved\nstate management. \nCVE-2022-22656\n\nGarageBand MIDI\nAvailable for: macOS Monterey\nImpact: Opening a maliciously crafted file may lead to unexpected\napplication termination or arbitrary code execution\nDescription: A memory initialization issue was addressed with\nimproved memory handling. \nCVE-2022-22657: Brandon Perry of Atredis Partners\n\nGarageBand MIDI\nAvailable for: macOS Monterey\nImpact: Opening a maliciously crafted file may lead to unexpected\napplication termination or arbitrary code execution\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2022-22664: Brandon Perry of Atredis Partners\n\nNSSpellChecker\nAvailable for: macOS Monterey\nImpact: A malicious application may be able to access information\nabout a user's contacts\nDescription: A privacy issue existed in the handling of Contact\ncards. This was addressed with improved state management. \nCVE-2022-22644: an anonymous researcher\n\nPackageKit\nAvailable for: macOS Monterey\nImpact: An application may be able to gain elevated privileges\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2022-22617: Mickey Jin (@patch1t)\n\nPreferences\nAvailable for: macOS Monterey\nImpact: A malicious application may be able to read other\napplications' settings\nDescription: The issue was addressed with additional permissions\nchecks. \nCVE-2022-22609: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020)\nof Tencent Security Xuanwu Lab (xlab.tencent.com)\n\nQuickTime Player\nAvailable for: macOS Monterey\nImpact: A plug-in may be able to inherit the application's\npermissions and access user data\nDescription: This issue was addressed with improved checks. \nCVE-2022-22650: Wojciech Reguła (@_r3ggi) of SecuRing\n\nSafari Downloads\nAvailable for: macOS Monterey\nImpact: A maliciously crafted ZIP archive may bypass Gatekeeper\nchecks\nDescription: This issue was addressed with improved checks. \nCVE-2022-22616: Ferdous Saljooki (@malwarezoo) and Jaron Bradley\n(@jbradley89) of Jamf Software, Mickey Jin (@patch1t)\n\nSandbox\nAvailable for: macOS Monterey\nImpact: A malicious application may be able to bypass certain Privacy\npreferences\nDescription: The issue was addressed with improved permissions logic. \nCVE-2022-22600: Sudhakar Muthumani of Primefort Private Limited,\nKhiem Tran\n\nSiri\nAvailable for: macOS Monterey\nImpact: A person with physical access to a device may be able to use\nSiri to obtain some location information from the lock screen\nDescription: A permissions issue was addressed with improved\nvalidation. \nCVE-2022-22599: Andrew Goldberg of the University of Texas at Austin,\nMcCombs School of Business (linkedin.com/andrew-goldberg/)\n\nSMB\nAvailable for: macOS Monterey\nImpact: A remote attacker may be able to cause unexpected system\ntermination or corrupt kernel memory\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2022-22651: Felix Poulin-Belanger\n\nSoftwareUpdate\nAvailable for: macOS Monterey\nImpact: An application may be able to gain elevated privileges\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2022-22639: Mickey Jin (@patch1t)\n\nSystem Preferences\nAvailable for: macOS Monterey\nImpact: An app may be able to spoof system notifications and UI\nDescription: This issue was addressed with a new entitlement. \nCVE-2022-22660: Guilherme Rambo of Best Buddy Apps (rambo.codes)\n\nUIKit\nAvailable for: macOS Monterey\nImpact: A person with physical access to an iOS device may be able to\nsee sensitive information via keyboard suggestions\nDescription: This issue was addressed with improved checks. \nCVE-2022-22621: Joey Hewitt\n\nVim\nAvailable for: macOS Monterey\nImpact: Multiple issues in Vim\nDescription: Multiple issues were addressed by updating Vim. \nCVE-2021-4136\nCVE-2021-4166\nCVE-2021-4173\nCVE-2021-4187\nCVE-2021-4192\nCVE-2021-4193\nCVE-2021-46059\nCVE-2022-0128\nCVE-2022-0156\nCVE-2022-0158\n\nVoiceOver\nAvailable for: macOS Monterey\nImpact: A user may be able to view restricted content from the lock\nscreen\nDescription: A lock screen issue was addressed with improved state\nmanagement. \nCVE-2021-30918: an anonymous researcher\n\nWebKit\nAvailable for: macOS Monterey\nImpact: Processing maliciously crafted web content may disclose\nsensitive user information\nDescription: A cookie management issue was addressed with improved\nstate management. \nWebKit Bugzilla: 232748\nCVE-2022-22662: Prakash (@1lastBr3ath) of Threat Nix\n\nWebKit\nAvailable for: macOS Monterey\nImpact: Processing maliciously crafted web content may lead to code\nexecution\nDescription: A memory corruption issue was addressed with improved\nstate management. \nWebKit Bugzilla: 232812\nCVE-2022-22610: Quan Yin of Bigo Technology Live Client Team\n\nWebKit\nAvailable for: macOS Monterey\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A use after free issue was addressed with improved\nmemory management. \nWebKit Bugzilla: 233172\nCVE-2022-22624: Kirin (@Pwnrin) of Tencent Security Xuanwu Lab\nWebKit Bugzilla: 234147\nCVE-2022-22628: Kirin (@Pwnrin) of Tencent Security Xuanwu Lab\n\nWebKit\nAvailable for: macOS Monterey\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A buffer overflow issue was addressed with improved\nmemory handling. \nWebKit Bugzilla: 234966\nCVE-2022-22629: Jeonghoon Shin at Theori working with Trend Micro\nZero Day Initiative\n\nWebKit\nAvailable for: macOS Monterey\nImpact: A malicious website may cause unexpected cross-origin\nbehavior\nDescription: A logic issue was addressed with improved state\nmanagement. \nWebKit Bugzilla: 235294\nCVE-2022-22637: Tom McKee of Google\n\nWi-Fi\nAvailable for: macOS Monterey\nImpact: A malicious application may be able to leak sensitive user\ninformation\nDescription: A logic issue was addressed with improved restrictions. \nCVE-2022-22668: MrPhil17\n\nxar\nAvailable for: macOS Monterey\nImpact: A local user may be able to write arbitrary files\nDescription: A validation issue existed in the handling of symlinks. \nThis issue was addressed with improved validation of symlinks. \nCVE-2022-22582: Richard Warren of NCC Group\n\nAdditional recognition\n\nAirDrop\nWe would like to acknowledge Omar Espino (omespino.com), Ron Masas of\nBreakPoint.sh for their assistance. \n\nBluetooth\nWe would like to acknowledge an anonymous researcher, chenyuwang\n(@mzzzz__) of Tencent Security Xuanwu Lab for their assistance. \n\nFace Gallery\nWe would like to acknowledge Tian Zhang (@KhaosT) for their\nassistance. \n\nIntel Graphics Driver\nWe would like to acknowledge Jack Dates of RET2 Systems, Inc., Yinyi\nWu (@3ndy1) for their assistance. \n\nLocal Authentication\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nNotes\nWe would like to acknowledge Nathaniel Ekoniak of Ennate Technologies\nfor their assistance. \n\nPassword Manager\nWe would like to acknowledge Maximilian Golla (@m33x) of Max Planck\nInstitute for Security and Privacy (MPI-SP) for their assistance. \n\nSiri\nWe would like to acknowledge an anonymous researcher for their\nassistance. \n\nsyslog\nWe would like to acknowledge Yonghwi Jin (@jinmo123) of Theori for\ntheir assistance. \n\nTCC\nWe would like to acknowledge Csaba Fitzl (@theevilbit) of Offensive\nSecurity for their assistance. \n\nUIKit\nWe would like to acknowledge Tim Shadel of Day Logger, Inc. for their\nassistance. \n\nWebKit\nWe would like to acknowledge Abdullah Md Shaleh for their assistance. \n\nWebKit Storage\nWe would like to acknowledge Martin Bajanik of FingerprintJS for\ntheir assistance. \n\nmacOS Monterey 12.3 may be obtained from the Mac App Store or Apple's\nSoftware Downloads web site: https://support.apple.com/downloads/\nAll information is also posted on the Apple Security Updates\nweb site: https://support.apple.com/en-us/HT201222. \n\nThis message is signed with Apple's Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\n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\nGXXJYMi1Q8gmJ9wK/A3d/FKY4FBZxpByUUgjYhiMKTU5cSeihaI=\n=RiA+\n-----END PGP SIGNATURE-----\n\n\n. Apple is aware of a report that this issue may\nhave been actively exploited. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202208-32\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Low\n Title: Vim, gVim: Multiple Vulnerabilities\n Date: August 21, 2022\n Bugs: #811870, #818562, #819528, #823473, #824930, #828583, #829658, #830106, #830994, #833572, #836432, #851231\n ID: 202208-32\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n=======\nMultiple vulnerabilities have been discovered in Vim, the worst of which\ncould result in denial of service. \n\nBackground\n=========\nVim is an efficient, highly configurable improved version of the classic\n‘vi’ text editor. gVim is the GUI version of Vim. \n\nAffected packages\n================\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 app-editors/gvim < 9.0.0060 >= 9.0.0060\n 2 app-editors/vim < 9.0.0060 >= 9.0.0060\n 3 app-editors/vim-core < 9.0.0060 >= 9.0.0060\n\nDescription\n==========\nMultiple vulnerabilities have been discovered in Vim and gVim. Please\nreview the CVE identifiers referenced below for details. \n\nImpact\n=====\nPlease review the referenced CVE identifiers for details. \n\nWorkaround\n=========\nThere is no known workaround at this time. \n\nResolution\n=========\nAll Vim users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-editors/vim-9.0.0060\"\n\nAll gVim users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-editors/gvim-9.0.0060\"\n\nAll vim-core users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \">=app-editors/vim-core-9.0.0060\"\n\nReferences\n=========\n[ 1 ] CVE-2021-3770\n https://nvd.nist.gov/vuln/detail/CVE-2021-3770\n[ 2 ] CVE-2021-3778\n https://nvd.nist.gov/vuln/detail/CVE-2021-3778\n[ 3 ] CVE-2021-3796\n https://nvd.nist.gov/vuln/detail/CVE-2021-3796\n[ 4 ] CVE-2021-3872\n https://nvd.nist.gov/vuln/detail/CVE-2021-3872\n[ 5 ] CVE-2021-3875\n https://nvd.nist.gov/vuln/detail/CVE-2021-3875\n[ 6 ] CVE-2021-3927\n https://nvd.nist.gov/vuln/detail/CVE-2021-3927\n[ 7 ] CVE-2021-3928\n https://nvd.nist.gov/vuln/detail/CVE-2021-3928\n[ 8 ] CVE-2021-3968\n https://nvd.nist.gov/vuln/detail/CVE-2021-3968\n[ 9 ] CVE-2021-3973\n https://nvd.nist.gov/vuln/detail/CVE-2021-3973\n[ 10 ] CVE-2021-3974\n https://nvd.nist.gov/vuln/detail/CVE-2021-3974\n[ 11 ] CVE-2021-3984\n https://nvd.nist.gov/vuln/detail/CVE-2021-3984\n[ 12 ] CVE-2021-4019\n https://nvd.nist.gov/vuln/detail/CVE-2021-4019\n[ 13 ] CVE-2021-4069\n https://nvd.nist.gov/vuln/detail/CVE-2021-4069\n[ 14 ] CVE-2021-4136\n https://nvd.nist.gov/vuln/detail/CVE-2021-4136\n[ 15 ] CVE-2021-4166\n https://nvd.nist.gov/vuln/detail/CVE-2021-4166\n[ 16 ] CVE-2021-4173\n https://nvd.nist.gov/vuln/detail/CVE-2021-4173\n[ 17 ] CVE-2021-4187\n https://nvd.nist.gov/vuln/detail/CVE-2021-4187\n[ 18 ] CVE-2021-4192\n https://nvd.nist.gov/vuln/detail/CVE-2021-4192\n[ 19 ] CVE-2021-4193\n https://nvd.nist.gov/vuln/detail/CVE-2021-4193\n[ 20 ] CVE-2021-46059\n https://nvd.nist.gov/vuln/detail/CVE-2021-46059\n[ 21 ] CVE-2022-0128\n https://nvd.nist.gov/vuln/detail/CVE-2022-0128\n[ 22 ] CVE-2022-0156\n https://nvd.nist.gov/vuln/detail/CVE-2022-0156\n[ 23 ] CVE-2022-0158\n https://nvd.nist.gov/vuln/detail/CVE-2022-0158\n[ 24 ] CVE-2022-0213\n https://nvd.nist.gov/vuln/detail/CVE-2022-0213\n[ 25 ] CVE-2022-0261\n https://nvd.nist.gov/vuln/detail/CVE-2022-0261\n[ 26 ] CVE-2022-0318\n https://nvd.nist.gov/vuln/detail/CVE-2022-0318\n[ 27 ] CVE-2022-0319\n https://nvd.nist.gov/vuln/detail/CVE-2022-0319\n[ 28 ] CVE-2022-0351\n https://nvd.nist.gov/vuln/detail/CVE-2022-0351\n[ 29 ] CVE-2022-0359\n https://nvd.nist.gov/vuln/detail/CVE-2022-0359\n[ 30 ] CVE-2022-0361\n https://nvd.nist.gov/vuln/detail/CVE-2022-0361\n[ 31 ] CVE-2022-0368\n https://nvd.nist.gov/vuln/detail/CVE-2022-0368\n[ 32 ] CVE-2022-0392\n https://nvd.nist.gov/vuln/detail/CVE-2022-0392\n[ 33 ] CVE-2022-0393\n https://nvd.nist.gov/vuln/detail/CVE-2022-0393\n[ 34 ] CVE-2022-0407\n https://nvd.nist.gov/vuln/detail/CVE-2022-0407\n[ 35 ] CVE-2022-0408\n https://nvd.nist.gov/vuln/detail/CVE-2022-0408\n[ 36 ] CVE-2022-0413\n https://nvd.nist.gov/vuln/detail/CVE-2022-0413\n[ 37 ] CVE-2022-0417\n https://nvd.nist.gov/vuln/detail/CVE-2022-0417\n[ 38 ] CVE-2022-0443\n https://nvd.nist.gov/vuln/detail/CVE-2022-0443\n[ 39 ] CVE-2022-0554\n https://nvd.nist.gov/vuln/detail/CVE-2022-0554\n[ 40 ] CVE-2022-0629\n https://nvd.nist.gov/vuln/detail/CVE-2022-0629\n[ 41 ] CVE-2022-0685\n https://nvd.nist.gov/vuln/detail/CVE-2022-0685\n[ 42 ] CVE-2022-0714\n https://nvd.nist.gov/vuln/detail/CVE-2022-0714\n[ 43 ] CVE-2022-0729\n https://nvd.nist.gov/vuln/detail/CVE-2022-0729\n[ 44 ] CVE-2022-0943\n https://nvd.nist.gov/vuln/detail/CVE-2022-0943\n[ 45 ] CVE-2022-1154\n https://nvd.nist.gov/vuln/detail/CVE-2022-1154\n[ 46 ] CVE-2022-1160\n https://nvd.nist.gov/vuln/detail/CVE-2022-1160\n[ 47 ] CVE-2022-1381\n https://nvd.nist.gov/vuln/detail/CVE-2022-1381\n[ 48 ] CVE-2022-1420\n https://nvd.nist.gov/vuln/detail/CVE-2022-1420\n[ 49 ] CVE-2022-1616\n https://nvd.nist.gov/vuln/detail/CVE-2022-1616\n[ 50 ] CVE-2022-1619\n https://nvd.nist.gov/vuln/detail/CVE-2022-1619\n[ 51 ] CVE-2022-1620\n https://nvd.nist.gov/vuln/detail/CVE-2022-1620\n[ 52 ] CVE-2022-1621\n https://nvd.nist.gov/vuln/detail/CVE-2022-1621\n[ 53 ] CVE-2022-1629\n https://nvd.nist.gov/vuln/detail/CVE-2022-1629\n[ 54 ] CVE-2022-1674\n https://nvd.nist.gov/vuln/detail/CVE-2022-1674\n[ 55 ] CVE-2022-1720\n https://nvd.nist.gov/vuln/detail/CVE-2022-1720\n[ 56 ] CVE-2022-1733\n https://nvd.nist.gov/vuln/detail/CVE-2022-1733\n[ 57 ] CVE-2022-1735\n https://nvd.nist.gov/vuln/detail/CVE-2022-1735\n[ 58 ] CVE-2022-1769\n https://nvd.nist.gov/vuln/detail/CVE-2022-1769\n[ 59 ] CVE-2022-1771\n https://nvd.nist.gov/vuln/detail/CVE-2022-1771\n[ 60 ] CVE-2022-1785\n https://nvd.nist.gov/vuln/detail/CVE-2022-1785\n[ 61 ] CVE-2022-1796\n https://nvd.nist.gov/vuln/detail/CVE-2022-1796\n[ 62 ] CVE-2022-1851\n https://nvd.nist.gov/vuln/detail/CVE-2022-1851\n[ 63 ] CVE-2022-1886\n https://nvd.nist.gov/vuln/detail/CVE-2022-1886\n[ 64 ] CVE-2022-1897\n https://nvd.nist.gov/vuln/detail/CVE-2022-1897\n[ 65 ] CVE-2022-1898\n https://nvd.nist.gov/vuln/detail/CVE-2022-1898\n[ 66 ] CVE-2022-1927\n https://nvd.nist.gov/vuln/detail/CVE-2022-1927\n[ 67 ] CVE-2022-1942\n https://nvd.nist.gov/vuln/detail/CVE-2022-1942\n[ 68 ] CVE-2022-1968\n https://nvd.nist.gov/vuln/detail/CVE-2022-1968\n[ 69 ] CVE-2022-2000\n https://nvd.nist.gov/vuln/detail/CVE-2022-2000\n[ 70 ] CVE-2022-2042\n https://nvd.nist.gov/vuln/detail/CVE-2022-2042\n[ 71 ] CVE-2022-2124\n https://nvd.nist.gov/vuln/detail/CVE-2022-2124\n[ 72 ] CVE-2022-2125\n https://nvd.nist.gov/vuln/detail/CVE-2022-2125\n[ 73 ] CVE-2022-2126\n https://nvd.nist.gov/vuln/detail/CVE-2022-2126\n[ 74 ] CVE-2022-2129\n https://nvd.nist.gov/vuln/detail/CVE-2022-2129\n[ 75 ] CVE-2022-2175\n https://nvd.nist.gov/vuln/detail/CVE-2022-2175\n[ 76 ] CVE-2022-2182\n https://nvd.nist.gov/vuln/detail/CVE-2022-2182\n[ 77 ] CVE-2022-2183\n https://nvd.nist.gov/vuln/detail/CVE-2022-2183\n[ 78 ] CVE-2022-2206\n https://nvd.nist.gov/vuln/detail/CVE-2022-2206\n[ 79 ] CVE-2022-2207\n https://nvd.nist.gov/vuln/detail/CVE-2022-2207\n[ 80 ] CVE-2022-2208\n https://nvd.nist.gov/vuln/detail/CVE-2022-2208\n[ 81 ] CVE-2022-2210\n https://nvd.nist.gov/vuln/detail/CVE-2022-2210\n[ 82 ] CVE-2022-2231\n https://nvd.nist.gov/vuln/detail/CVE-2022-2231\n[ 83 ] CVE-2022-2257\n https://nvd.nist.gov/vuln/detail/CVE-2022-2257\n[ 84 ] CVE-2022-2264\n https://nvd.nist.gov/vuln/detail/CVE-2022-2264\n[ 85 ] CVE-2022-2284\n https://nvd.nist.gov/vuln/detail/CVE-2022-2284\n[ 86 ] CVE-2022-2285\n https://nvd.nist.gov/vuln/detail/CVE-2022-2285\n[ 87 ] CVE-2022-2286\n https://nvd.nist.gov/vuln/detail/CVE-2022-2286\n[ 88 ] CVE-2022-2287\n https://nvd.nist.gov/vuln/detail/CVE-2022-2287\n[ 89 ] CVE-2022-2288\n https://nvd.nist.gov/vuln/detail/CVE-2022-2288\n[ 90 ] CVE-2022-2289\n https://nvd.nist.gov/vuln/detail/CVE-2022-2289\n[ 91 ] CVE-2022-2304\n https://nvd.nist.gov/vuln/detail/CVE-2022-2304\n[ 92 ] CVE-2022-2343\n https://nvd.nist.gov/vuln/detail/CVE-2022-2343\n[ 93 ] CVE-2022-2344\n https://nvd.nist.gov/vuln/detail/CVE-2022-2344\n[ 94 ] CVE-2022-2345\n https://nvd.nist.gov/vuln/detail/CVE-2022-2345\n\nAvailability\n===========\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202208-32\n\nConcerns?\n========\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users' machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n======\nCopyright 2022 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. \nCVE-2022-32787: Dohyun Lee (@l33d0hyun) of SSD Secure Disclosure Labs\n& DNSLab, Korea Univ. \nCVE-2022-32812: Yinyi Wu (@3ndy1), ABC Research s.r.o", sources: [ { db: "NVD", id: "CVE-2021-4136", }, { db: "JVNDB", id: "JVNDB-2021-016868", }, { db: "VULHUB", id: "VHN-408692", }, { db: "VULMON", id: "CVE-2021-4136", }, { db: "PACKETSTORM", id: "166319", }, { db: "PACKETSTORM", id: "167188", }, { db: "PACKETSTORM", id: "168124", }, { db: "PACKETSTORM", id: "167789", }, ], trust: 2.16, }, exploit_availability: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { reference: "https://www.scap.org.cn/vuln/vhn-408692", trust: 0.1, type: "unknown", }, ], sources: [ { db: "VULHUB", id: "VHN-408692", }, ], }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2021-4136", trust: 3.8, }, { db: "OPENWALL", id: "OSS-SECURITY/2022/01/15/1", trust: 1.8, }, { db: "PACKETSTORM", id: "168124", trust: 0.8, }, { db: "PACKETSTORM", id: "167789", trust: 0.8, }, { db: "PACKETSTORM", id: "167188", trust: 0.8, }, { db: "PACKETSTORM", id: "166319", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2021-016868", trust: 0.8, }, { db: "AUSCERT", id: "ESB-2022.3561", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2023.0019", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.3002", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2022.2412", trust: 0.6, }, { db: "CS-HELP", id: "SB2022072103", trust: 0.6, }, { db: "CS-HELP", id: "SB2022051702", trust: 0.6, }, { db: "CS-HELP", id: "SB2022031433", trust: 0.6, }, { db: "CS-HELP", id: "SB2022062022", trust: 0.6, }, { db: "CS-HELP", id: "SB2022022221", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202112-1496", trust: 0.6, }, { db: "CNVD", id: "CNVD-2022-05065", trust: 0.1, }, { db: "VULHUB", id: "VHN-408692", trust: 0.1, }, { db: "VULMON", id: "CVE-2021-4136", trust: 0.1, }, ], sources: [ { db: "VULHUB", id: "VHN-408692", }, { db: "VULMON", id: "CVE-2021-4136", }, { db: "JVNDB", id: "JVNDB-2021-016868", }, { db: "PACKETSTORM", id: "166319", }, { db: "PACKETSTORM", id: "167188", }, { db: "PACKETSTORM", id: "168124", }, { db: "PACKETSTORM", id: "167789", }, { db: "NVD", id: "CVE-2021-4136", }, { db: "CNNVD", id: "CNNVD-202112-1496", }, ], }, id: "VAR-202112-1669", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VULHUB", id: "VHN-408692", }, ], trust: 0.01, }, last_update_date: "2023-12-18T11:33:10.152000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "HT213256 Apple Security update", trust: 0.8, url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ey2vfbu3yggwi5bw4xkt3f37mygequd/", }, { title: "vim Security vulnerabilities", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=176292", }, { title: "Debian CVElist Bug Report Logs: vim: CVE-2021-4136", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=8555eee3fc6f369b98c0f1edfd9a3e96", }, { title: "Red Hat: CVE-2021-4136", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=cve-2021-4136", }, { title: "Amazon Linux AMI: ALAS-2022-1557", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=alas-2022-1557", }, { title: "Amazon Linux 2: ALAS2-2022-1743", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=alas2-2022-1743", }, { title: "Amazon Linux 2022: ALAS2022-2022-014", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022&qid=alas2022-2022-014", }, { title: "Apple: macOS Monterey 12.3", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=f1105c4a20da11497b610b14a1668180", }, { title: "Apple: Security Update 2022-005 Catalina", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=b71ee1a3b689c178ee5a5bc823295063", }, ], sources: [ { db: "VULMON", id: "CVE-2021-4136", }, { db: "JVNDB", id: "JVNDB-2021-016868", }, { db: "CNNVD", id: "CNNVD-202112-1496", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-122", trust: 1.1, }, { problemtype: "Out-of-bounds writing (CWE-787) [NVD evaluation ]", trust: 0.8, }, ], sources: [ { db: "VULHUB", id: "VHN-408692", }, { db: "JVNDB", id: "JVNDB-2021-016868", }, { db: "NVD", id: "CVE-2021-4136", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.9, url: "https://security.gentoo.org/glsa/202208-32", }, { trust: 1.8, url: "https://support.apple.com/kb/ht213183", }, { trust: 1.8, url: "https://support.apple.com/kb/ht213256", }, { trust: 1.8, url: "https://support.apple.com/kb/ht213343", }, { trust: 1.8, url: "https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938", }, { trust: 1.8, url: "http://seclists.org/fulldisclosure/2022/mar/29", }, { trust: 1.8, url: "http://seclists.org/fulldisclosure/2022/may/35", }, { trust: 1.8, url: "http://seclists.org/fulldisclosure/2022/jul/14", }, { trust: 1.8, url: "https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264", }, { trust: 1.8, url: "http://www.openwall.com/lists/oss-security/2022/01/15/1", }, { trust: 1.2, url: "https://nvd.nist.gov/vuln/detail/cve-2021-4136", }, { trust: 1, url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ey2vfbu3yggwi5bw4xkt3f37mygequd/", }, { trust: 1, url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3fh2j57gda2wmbs6j56f6qqra6bxqqfz/", }, { trust: 0.8, url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3fh2j57gda2wmbs6j56f6qqra6bxqqfz/", }, { trust: 0.8, url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ey2vfbu3yggwi5bw4xkt3f37mygequd/", }, { trust: 0.8, url: "https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938/", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022072103", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022051702", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022022221", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/vim-buffer-overflow-via-eval-lambda-37182", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/167789/apple-security-advisory-2022-07-20-4.html", }, { trust: 0.6, url: "https://support.apple.com/en-us/ht213183", }, { trust: 0.6, url: "https://support.apple.com/en-us/ht213343", }, { trust: 0.6, url: "https://support.apple.com/en-us/ht213256", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2023.0019", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/166319/apple-security-advisory-2022-03-14-4.html", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022062022", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/167188/apple-security-advisory-2022-05-16-3.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.3561", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.3002", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/168124/gentoo-linux-security-advisory-202208-32.html", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2022031433", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2022.2412", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2021-4173", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2021-4192", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2021-46059", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2021-4193", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2021-4166", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0128", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2021-4187", }, { trust: 0.3, url: "https://support.apple.com/en-us/ht201222.", }, { trust: 0.3, url: "https://support.apple.com/downloads/", }, { trust: 0.3, url: "https://www.apple.com/support/security/pgp/", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0156", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0158", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/122.html", }, { trust: 0.1, url: "https://github.com/live-hack-cve/cve-2021-4136", }, { trust: 0.1, url: "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002534", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://alas.aws.amazon.com/alas-2022-1557.html", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22609", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22612", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22610", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22616", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-22945", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22613", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-30918", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22600", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-36976", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-22947", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22599", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22597", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22611", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22615", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22582", }, { trust: 0.1, url: "https://support.apple.com/ht213183.", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-22946", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22614", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22721", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-23308", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22589", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22663", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-44790", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22674", }, { trust: 0.1, url: "https://support.apple.com/ht213256.", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0530", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-44224", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-26698", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22719", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-26697", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0778", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-45444", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2018-25032", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22675", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22720", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-26706", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-22665", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-26712", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0361", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2129", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0261", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0413", }, { trust: 0.1, url: "https://creativecommons.org/licenses/by-sa/2.5", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0943", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1927", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3796", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2175", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0408", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2286", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2126", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1886", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1771", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1851", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2000", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2287", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1674", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0417", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1968", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1621", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0407", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0318", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2284", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2288", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0392", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2345", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2257", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1154", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0368", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0554", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0443", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2124", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2343", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1381", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1735", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0714", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2125", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3778", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1733", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2207", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3984", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0629", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1629", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0393", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2183", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-4069", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1616", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2264", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3927", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1619", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0685", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2304", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1620", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0319", }, { trust: 0.1, url: "https://bugs.gentoo.org.", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1898", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3974", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2344", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0351", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3928", }, { trust: 0.1, url: "https://security.gentoo.org/", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-4019", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3968", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1785", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0213", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1796", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0729", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2206", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1720", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3770", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1769", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1897", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2289", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-0359", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3973", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1420", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2042", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2182", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3872", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1160", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3875", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2231", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2285", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2208", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-1942", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-2210", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-32786", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-32781", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-32797", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-32785", }, { trust: 0.1, url: "https://support.apple.com/ht213343.", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-26704", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2022-32787", }, ], sources: [ { db: "VULHUB", id: "VHN-408692", }, { db: "VULMON", id: "CVE-2021-4136", }, { db: "JVNDB", id: "JVNDB-2021-016868", }, { db: "PACKETSTORM", id: "166319", }, { db: "PACKETSTORM", id: "167188", }, { db: "PACKETSTORM", id: "168124", }, { db: "PACKETSTORM", id: "167789", }, { db: "NVD", id: "CVE-2021-4136", }, { db: "CNNVD", id: "CNNVD-202112-1496", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "VULHUB", id: "VHN-408692", }, { db: "VULMON", id: "CVE-2021-4136", }, { db: "JVNDB", id: "JVNDB-2021-016868", }, { db: "PACKETSTORM", id: "166319", }, { db: "PACKETSTORM", id: "167188", }, { db: "PACKETSTORM", id: "168124", }, { db: "PACKETSTORM", id: "167789", }, { db: "NVD", id: "CVE-2021-4136", }, { db: "CNNVD", id: "CNNVD-202112-1496", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-12-19T00:00:00", db: "VULHUB", id: "VHN-408692", }, { date: "2021-12-19T00:00:00", db: "VULMON", id: "CVE-2021-4136", }, { date: "2022-12-26T00:00:00", db: "JVNDB", id: "JVNDB-2021-016868", }, { date: "2022-03-15T15:49:02", db: "PACKETSTORM", id: "166319", }, { date: "2022-05-17T16:59:42", db: "PACKETSTORM", id: "167188", }, { date: "2022-08-22T16:01:59", db: "PACKETSTORM", id: "168124", }, { date: "2022-07-22T16:23:52", db: "PACKETSTORM", id: "167789", }, { date: "2021-12-19T17:15:07.553000", db: "NVD", id: "CVE-2021-4136", }, { date: "2021-12-19T00:00:00", db: "CNNVD", id: "CNNVD-202112-1496", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-09-01T00:00:00", db: "VULHUB", id: "VHN-408692", }, { date: "2022-09-01T00:00:00", db: "VULMON", id: "CVE-2021-4136", }, { date: "2022-12-26T02:14:00", db: "JVNDB", id: "JVNDB-2021-016868", }, { date: "2023-11-07T03:40:14.043000", db: "NVD", id: "CVE-2021-4136", }, { date: "2023-01-03T00:00:00", db: "CNNVD", id: "CNNVD-202112-1496", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "CNNVD", id: "CNNVD-202112-1496", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "vim Out-of-bounds write vulnerability in", sources: [ { db: "JVNDB", id: "JVNDB-2021-016868", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-202112-1496", }, ], trust: 0.6, }, }
wid-sec-w-2022-0353
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in vim ausnutzen,um einen Denial of Service zu verursachen, Sicherheitsmechanismen zu umgehen, den Speicher zu manipulieren oder potentiell Code auszuführen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows\n- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0353 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0353.json", }, { category: "self", summary: "WID-SEC-2022-0353 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0353", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:4619-1 vom 2022-12-27", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html", }, { category: "external", summary: "NIST Vulnerability Database vom 2021-12-19", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-4136", }, { category: "external", summary: "PoC auf huntr.dev", url: "https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938/", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1557 vom 2022-01-20", url: "https://alas.aws.amazon.com/ALAS-2022-1557.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1743 vom 2022-01-27", url: "https://alas.aws.amazon.com/AL2/ALAS-2022-1743.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-014 vom 2022-01-27", url: "https://alas.aws.amazon.com/AL2022/ALAS-2022-014.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2102-1 vom 2022-06-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202208-32 vom 2022-08-23", url: "https://security.gentoo.org/glsa/202208-32", }, ], source_lang: "en-US", title: "vim: Schwachstelle ermöglicht Codeausführung", tracking: { current_release_date: "2022-12-26T23:00:00.000+00:00", generator: { date: "2024-08-15T17:28:37.828+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0353", initial_release_date: "2021-12-19T23:00:00.000+00:00", revision_history: [ { date: "2021-12-19T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-01-05T23:00:00.000+00:00", number: "2", summary: "Referenz(en) aufgenommen: FEDORA-2022-A3D70B50F0, FEDORA-2022-B5DE00C0F2", }, { date: "2022-01-12T23:00:00.000+00:00", number: "3", summary: "Referenz(en) aufgenommen: FEDORA-2022-48B86D586F", }, { date: "2022-01-19T23:00:00.000+00:00", number: "4", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-01-27T23:00:00.000+00:00", number: "5", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-06-16T22:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-08-22T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2022-12-26T23:00:00.000+00:00", number: "8", summary: "Neue Updates von SUSE aufgenommen", }, ], status: "final", version: "8", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "Open Source vim < 8.2.3847", product: { name: "Open Source vim < 8.2.3847", product_id: "T021391", product_identification_helper: { cpe: "cpe:/a:vim:vim:8.2.3847", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, ], }, vulnerabilities: [ { cve: "CVE-2021-4136", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in vim. Diese besteht aufgrund eines Heap-basierten Pufferüberlaufs. Ein Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen, Sicherheitsmechanismen zu umgehen, den Speicher zu manipulieren oder potentiell Code auszuführen. Zur erfolgreichen Ausnutzung muss eine speziell gestaltete Datei mit bestimmen Kommandozeilenparametern in vim geöffnet werden.", }, ], product_status: { known_affected: [ "T002207", "398363", "T012167", ], }, release_date: "2021-12-19T23:00:00.000+00:00", title: "CVE-2021-4136", }, ], }
WID-SEC-W-2024-0794
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Dell ECS ist ein Objektspeichersystem.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-0794 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json", }, { category: "self", summary: "WID-SEC-2024-0794 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794", }, { category: "external", summary: "Dell Security Advisory DSA-2024-141 vom 2024-04-04", url: "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=", }, ], source_lang: "en-US", title: "Dell ECS: Mehrere Schwachstellen", tracking: { current_release_date: "2024-11-27T23:00:00.000+00:00", generator: { date: "2024-11-28T11:39:04.623+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2024-0794", initial_release_date: "2024-04-04T22:00:00.000+00:00", revision_history: [ { date: "2024-04-04T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-11-27T23:00:00.000+00:00", number: "2", summary: "Produktzuordnung überprüft", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<3.8.1.0", product: { name: "Dell ECS <3.8.1.0", product_id: "T033919", }, }, { category: "product_version", name: "3.8.1.0", product: { name: "Dell ECS 3.8.1.0", product_id: "T033919-fixed", product_identification_helper: { cpe: "cpe:/h:dell:ecs:3.8.1.0", }, }, }, ], category: "product_name", name: "ECS", }, ], category: "vendor", name: "Dell", }, ], }, vulnerabilities: [ { cve: "CVE-2018-18074", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2018-18074", }, { cve: "CVE-2020-10663", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10663", }, { cve: "CVE-2020-10672", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10672", }, { cve: "CVE-2020-10673", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10673", }, { cve: "CVE-2020-10735", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10735", }, { cve: "CVE-2020-10968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10968", }, { cve: "CVE-2020-10969", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10969", }, { cve: "CVE-2020-11111", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11111", }, { cve: "CVE-2020-11112", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11112", }, { cve: "CVE-2020-11113", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11113", }, { cve: "CVE-2020-11612", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11612", }, { cve: "CVE-2020-11619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11619", }, { cve: "CVE-2020-11620", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11620", }, { cve: "CVE-2020-11979", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11979", }, { cve: "CVE-2020-12762", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-12762", }, { cve: "CVE-2020-12825", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-12825", }, { cve: "CVE-2020-13956", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-13956", }, { cve: "CVE-2020-14060", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14060", }, { cve: "CVE-2020-14061", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14061", }, { cve: "CVE-2020-14062", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14062", }, { cve: "CVE-2020-14195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14195", }, { cve: "CVE-2020-15250", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-15250", }, { cve: "CVE-2020-1945", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1945", }, { cve: "CVE-2020-1967", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1967", }, { cve: "CVE-2020-1971", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1971", }, { cve: "CVE-2020-24616", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-24616", }, { cve: "CVE-2020-24750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-24750", }, { cve: "CVE-2020-25649", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-25649", }, { cve: "CVE-2020-25658", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-25658", }, { cve: "CVE-2020-26116", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26116", }, { cve: "CVE-2020-26137", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26137", }, { cve: "CVE-2020-26541", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26541", }, { cve: "CVE-2020-27216", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27216", }, { cve: "CVE-2020-27218", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27218", }, { cve: "CVE-2020-27223", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27223", }, { cve: "CVE-2020-28366", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-28366", }, { cve: "CVE-2020-28493", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-28493", }, { cve: "CVE-2020-29509", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29509", }, { cve: "CVE-2020-29511", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29511", }, { cve: "CVE-2020-29582", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29582", }, { cve: "CVE-2020-29651", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29651", }, { cve: "CVE-2020-35490", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35490", }, { cve: "CVE-2020-35491", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35491", }, { cve: "CVE-2020-35728", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35728", }, { cve: "CVE-2020-36179", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36179", }, { cve: "CVE-2020-36180", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36180", }, { cve: "CVE-2020-36181", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36181", }, { cve: "CVE-2020-36182", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36182", }, { cve: "CVE-2020-36183", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36183", }, { cve: "CVE-2020-36184", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36184", }, { cve: "CVE-2020-36185", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36185", }, { cve: "CVE-2020-36186", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36186", }, { cve: "CVE-2020-36187", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36187", }, { cve: "CVE-2020-36188", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36188", }, { cve: "CVE-2020-36189", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36189", }, { cve: "CVE-2020-36516", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36516", }, { cve: "CVE-2020-36518", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36518", }, { cve: "CVE-2020-36557", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36557", }, { cve: "CVE-2020-36558", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36558", }, { cve: "CVE-2020-36691", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36691", }, { cve: "CVE-2020-7238", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-7238", }, { cve: "CVE-2020-8840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8840", }, { cve: "CVE-2020-8908", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8908", }, { cve: "CVE-2020-8911", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8911", }, { cve: "CVE-2020-8912", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8912", }, { cve: "CVE-2020-9488", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9488", }, { cve: "CVE-2020-9493", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9493", }, { cve: "CVE-2020-9546", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9546", }, { cve: "CVE-2020-9547", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9547", }, { cve: "CVE-2020-9548", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9548", }, { cve: "CVE-2021-20190", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-20190", }, { cve: "CVE-2021-20323", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-20323", }, { cve: "CVE-2021-21290", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21290", }, { cve: "CVE-2021-21295", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21295", }, { cve: "CVE-2021-21409", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21409", }, { cve: "CVE-2021-23840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-23840", }, { cve: "CVE-2021-23841", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-23841", }, { cve: "CVE-2021-2471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-2471", }, { cve: "CVE-2021-25642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-25642", }, { cve: "CVE-2021-26341", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-26341", }, { cve: "CVE-2021-27918", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-27918", }, { cve: "CVE-2021-28153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28153", }, { cve: "CVE-2021-28165", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28165", }, { cve: "CVE-2021-28169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28169", }, { cve: "CVE-2021-28861", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28861", }, { cve: "CVE-2021-29425", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-29425", }, { cve: "CVE-2021-30560", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-30560", }, { cve: "CVE-2021-3114", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3114", }, { cve: "CVE-2021-33036", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33036", }, { cve: "CVE-2021-33194", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33194", }, { cve: "CVE-2021-33195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33195", }, { cve: "CVE-2021-33196", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33196", }, { cve: "CVE-2021-33197", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33197", }, { cve: "CVE-2021-33503", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33503", }, { cve: "CVE-2021-33655", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33655", }, { cve: "CVE-2021-33656", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33656", }, { cve: "CVE-2021-3424", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3424", }, { cve: "CVE-2021-34428", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-34428", }, { cve: "CVE-2021-3449", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3449", }, { cve: "CVE-2021-3450", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3450", }, { cve: "CVE-2021-3530", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3530", }, { cve: "CVE-2021-36221", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36221", }, { cve: "CVE-2021-36373", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36373", }, { cve: "CVE-2021-36374", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36374", }, { cve: "CVE-2021-3648", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3648", }, { cve: "CVE-2021-36690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36690", }, { cve: "CVE-2021-3711", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3711", }, { cve: "CVE-2021-3712", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3712", }, { cve: "CVE-2021-37136", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37136", }, { cve: "CVE-2021-37137", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37137", }, { cve: "CVE-2021-37404", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37404", }, { cve: "CVE-2021-37533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37533", }, { cve: "CVE-2021-3754", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3754", }, { cve: "CVE-2021-3778", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3796", }, { cve: "CVE-2021-3826", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3826", }, { cve: "CVE-2021-3827", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3827", }, { cve: "CVE-2021-38297", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-38297", }, { cve: "CVE-2021-3872", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3903", }, { cve: "CVE-2021-3923", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3923", }, { cve: "CVE-2021-3927", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4019", }, { cve: "CVE-2021-4037", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4037", }, { cve: "CVE-2021-4069", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4069", }, { cve: "CVE-2021-4104", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4104", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2021-4157", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4157", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-41771", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-41771", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4203", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4203", }, { cve: "CVE-2021-42567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-42567", }, { cve: "CVE-2021-43797", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-43797", }, { cve: "CVE-2021-44531", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44531", }, { cve: "CVE-2021-44532", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44532", }, { cve: "CVE-2021-44533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44533", }, { cve: "CVE-2021-44716", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44716", }, { cve: "CVE-2021-44878", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44878", }, { cve: "CVE-2021-45078", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-45078", }, { cve: "CVE-2021-46195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46195", }, { cve: "CVE-2021-46828", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46828", }, { cve: "CVE-2021-46848", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46848", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2022-0213", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0213", }, { cve: "CVE-2022-0225", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0225", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0361", }, { cve: "CVE-2022-0392", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0407", }, { cve: "CVE-2022-0413", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0413", }, { cve: "CVE-2022-0561", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0561", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-1184", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1184", }, { cve: "CVE-2022-1245", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1245", }, { cve: "CVE-2022-1271", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1271", }, { cve: "CVE-2022-1292", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1292", }, { cve: "CVE-2022-1381", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1420", }, { cve: "CVE-2022-1462", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1462", }, { cve: "CVE-2022-1466", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1466", }, { cve: "CVE-2022-1471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1471", }, { cve: "CVE-2022-1586", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1586", }, { cve: "CVE-2022-1587", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1587", }, { cve: "CVE-2022-1616", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1620", }, { cve: "CVE-2022-1679", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1679", }, { cve: "CVE-2022-1705", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1705", }, { cve: "CVE-2022-1720", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1720", }, { cve: "CVE-2022-1729", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1729", }, { cve: "CVE-2022-1733", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1735", }, { cve: "CVE-2022-1771", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1927", }, { cve: "CVE-2022-1962", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1962", }, { cve: "CVE-2022-1968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1968", }, { cve: "CVE-2022-1974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1974", }, { cve: "CVE-2022-1975", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1975", }, { cve: "CVE-2022-20132", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20132", }, { cve: "CVE-2022-20141", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20141", }, { cve: "CVE-2022-20154", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20154", }, { cve: "CVE-2022-20166", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20166", }, { cve: "CVE-2022-20368", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20368", }, { cve: "CVE-2022-20369", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20369", }, { cve: "CVE-2022-2047", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2047", }, { cve: "CVE-2022-2048", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2048", }, { cve: "CVE-2022-20567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20567", }, { cve: "CVE-2022-2068", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2068", }, { cve: "CVE-2022-2097", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2097", }, { cve: "CVE-2022-21216", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21216", }, { cve: "CVE-2022-21233", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21233", }, { cve: "CVE-2022-2124", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2126", }, { cve: "CVE-2022-2129", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2129", }, { cve: "CVE-2022-21363", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21363", }, { cve: "CVE-2022-21385", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21385", }, { cve: "CVE-2022-21499", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21499", }, { cve: "CVE-2022-2153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2153", }, { cve: "CVE-2022-21540", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21540", }, { cve: "CVE-2022-21541", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21541", }, { cve: "CVE-2022-21549", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21549", }, { cve: "CVE-2022-21618", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21618", }, { cve: "CVE-2022-21619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21619", }, { cve: "CVE-2022-21624", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21624", }, { cve: "CVE-2022-21626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21626", }, { cve: "CVE-2022-21628", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21628", }, { cve: "CVE-2022-21702", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21702", }, { cve: "CVE-2022-2175", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2175", }, { cve: "CVE-2022-2182", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2182", }, { cve: "CVE-2022-2183", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2183", }, { cve: "CVE-2022-2206", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2206", }, { cve: "CVE-2022-2207", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2207", }, { cve: "CVE-2022-2208", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2208", }, { cve: "CVE-2022-2210", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2210", }, { cve: "CVE-2022-2231", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2231", }, { cve: "CVE-2022-2256", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2256", }, { cve: "CVE-2022-2257", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2257", }, { cve: "CVE-2022-2264", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2264", }, { cve: "CVE-2022-2284", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2284", }, { cve: "CVE-2022-2285", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2285", }, { cve: "CVE-2022-2286", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2286", }, { cve: "CVE-2022-2287", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2287", }, { cve: "CVE-2022-22976", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-22976", }, { cve: "CVE-2022-22978", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-22978", }, { cve: "CVE-2022-2304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2304", }, { cve: "CVE-2022-2318", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2318", }, { cve: "CVE-2022-23302", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23302", }, { cve: "CVE-2022-23305", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23305", }, { cve: "CVE-2022-23307", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23307", }, { cve: "CVE-2022-2343", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2343", }, { cve: "CVE-2022-2344", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2344", }, { cve: "CVE-2022-2345", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2345", }, { cve: "CVE-2022-23471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23471", }, { cve: "CVE-2022-23521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23521", }, { cve: "CVE-2022-23772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23772", }, { cve: "CVE-2022-23773", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23773", }, { cve: "CVE-2022-24302", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24302", }, { cve: "CVE-2022-24329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24329", }, { cve: "CVE-2022-24823", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24823", }, { cve: "CVE-2022-24903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24903", }, { cve: "CVE-2022-2503", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2503", }, { cve: "CVE-2022-25147", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25147", }, { cve: "CVE-2022-25168", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25168", }, { cve: "CVE-2022-2519", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2519", }, { cve: "CVE-2022-2520", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2520", }, { cve: "CVE-2022-2521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2521", }, { cve: "CVE-2022-2522", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2522", }, { cve: "CVE-2022-25647", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25647", }, { cve: "CVE-2022-2571", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2571", }, { cve: "CVE-2022-2580", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2580", }, { cve: "CVE-2022-2581", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2581", }, { cve: "CVE-2022-25857", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25857", }, { cve: "CVE-2022-2588", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2588", }, { cve: "CVE-2022-2598", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2598", }, { cve: "CVE-2022-26148", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26148", }, { cve: "CVE-2022-26365", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26365", }, { cve: "CVE-2022-26373", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26373", }, { cve: "CVE-2022-2639", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2639", }, { cve: "CVE-2022-26612", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26612", }, { cve: "CVE-2022-2663", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2663", }, { cve: "CVE-2022-27781", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27781", }, { cve: "CVE-2022-27782", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27782", }, { cve: "CVE-2022-27943", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27943", }, { cve: "CVE-2022-2795", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2795", }, { cve: "CVE-2022-28131", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28131", }, { cve: "CVE-2022-2816", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2816", }, { cve: "CVE-2022-2817", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2817", }, { cve: "CVE-2022-2819", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2819", }, { cve: "CVE-2022-28327", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28327", }, { cve: "CVE-2022-2845", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2845", }, { cve: "CVE-2022-2849", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2849", }, { cve: "CVE-2022-2862", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2862", }, { cve: "CVE-2022-2867", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2867", }, { cve: "CVE-2022-2868", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2868", }, { cve: "CVE-2022-2869", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2869", }, { cve: "CVE-2022-28693", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28693", }, { cve: "CVE-2022-2874", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2874", }, { cve: "CVE-2022-28748", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28748", }, { cve: "CVE-2022-2880", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2880", }, { cve: "CVE-2022-2889", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2889", }, { cve: "CVE-2022-29162", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29162", }, { cve: "CVE-2022-29187", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29187", }, { cve: "CVE-2022-2923", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2923", }, { cve: "CVE-2022-2946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2946", }, { cve: "CVE-2022-29526", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29526", }, { cve: "CVE-2022-29583", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29583", }, { cve: "CVE-2022-2964", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2964", }, { cve: "CVE-2022-2977", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2977", }, { cve: "CVE-2022-2980", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2980", }, { cve: "CVE-2022-2982", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2982", }, { cve: "CVE-2022-29900", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29900", }, { cve: "CVE-2022-29901", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29901", }, { cve: "CVE-2022-2991", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2991", }, { cve: "CVE-2022-3016", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3016", }, { cve: "CVE-2022-3028", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3028", }, { cve: "CVE-2022-3037", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3037", }, { cve: "CVE-2022-30580", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30580", }, { cve: "CVE-2022-30630", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30630", }, { cve: "CVE-2022-30631", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30631", }, { cve: "CVE-2022-30632", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30632", }, { cve: "CVE-2022-30633", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30633", }, { cve: "CVE-2022-3099", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3099", }, { cve: "CVE-2022-31030", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31030", }, { cve: "CVE-2022-31159", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31159", }, { cve: "CVE-2022-3134", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3134", }, { cve: "CVE-2022-3153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3153", }, { cve: "CVE-2022-3169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3169", }, { cve: "CVE-2022-31690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31690", }, { cve: "CVE-2022-32148", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32148", }, { cve: "CVE-2022-32149", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32149", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32221", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32221", }, { cve: "CVE-2022-3234", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3234", }, { cve: "CVE-2022-3235", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3235", }, { cve: "CVE-2022-3239", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3239", }, { cve: "CVE-2022-3278", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3278", }, { cve: "CVE-2022-3296", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3296", }, { cve: "CVE-2022-3297", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3297", }, { cve: "CVE-2022-33196", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33196", }, { cve: "CVE-2022-3324", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3324", }, { cve: "CVE-2022-3352", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3352", }, { cve: "CVE-2022-33740", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33740", }, { cve: "CVE-2022-33741", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33741", }, { cve: "CVE-2022-33742", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33742", }, { cve: "CVE-2022-33972", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33972", }, { cve: "CVE-2022-33981", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33981", }, { cve: "CVE-2022-34169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34169", }, { cve: "CVE-2022-3424", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3424", }, { cve: "CVE-2022-34266", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34266", }, { cve: "CVE-2022-34526", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34526", }, { cve: "CVE-2022-34903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34903", }, { cve: "CVE-2022-3491", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3491", }, { cve: "CVE-2022-3515", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3515", }, { cve: "CVE-2022-3520", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3520", }, { cve: "CVE-2022-3521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3521", }, { cve: "CVE-2022-3524", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3524", }, { cve: "CVE-2022-35252", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-35252", }, { cve: "CVE-2022-3542", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3542", }, { cve: "CVE-2022-3545", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3545", }, { cve: "CVE-2022-3564", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3564", }, { cve: "CVE-2022-3565", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3565", }, { cve: "CVE-2022-3566", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3566", }, { cve: "CVE-2022-3567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3567", }, { cve: "CVE-2022-35737", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-35737", }, { cve: "CVE-2022-3586", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3586", }, { cve: "CVE-2022-3591", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3591", }, { cve: "CVE-2022-3594", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3594", }, { cve: "CVE-2022-3597", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3597", }, { cve: "CVE-2022-3599", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3599", }, { cve: "CVE-2022-36109", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36109", }, { cve: "CVE-2022-3621", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3621", }, { cve: "CVE-2022-3626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3626", }, { cve: "CVE-2022-3627", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3627", }, { cve: "CVE-2022-3628", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3628", }, { cve: "CVE-2022-36280", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36280", }, { cve: "CVE-2022-3629", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3629", }, { cve: "CVE-2022-3635", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3635", }, { cve: "CVE-2022-3643", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3643", }, { cve: "CVE-2022-36437", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36437", }, { cve: "CVE-2022-3646", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3646", }, { cve: "CVE-2022-3649", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3649", }, { cve: "CVE-2022-36760", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36760", }, { cve: "CVE-2022-36879", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36879", }, { cve: "CVE-2022-36946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36946", }, { cve: "CVE-2022-3705", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3705", }, { cve: "CVE-2022-37434", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37434", }, { cve: "CVE-2022-37436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37436", }, { cve: "CVE-2022-37865", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37865", }, { cve: "CVE-2022-37866", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37866", }, { cve: "CVE-2022-38090", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38090", }, { cve: "CVE-2022-38096", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38096", }, { cve: "CVE-2022-38126", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38126", }, { cve: "CVE-2022-38127", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38127", }, { cve: "CVE-2022-38177", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38177", }, { cve: "CVE-2022-38178", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38178", }, { cve: "CVE-2022-3821", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3821", }, { cve: "CVE-2022-38533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38533", }, { cve: "CVE-2022-38749", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38749", }, { cve: "CVE-2022-38750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38750", }, { cve: "CVE-2022-38751", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38751", }, { cve: "CVE-2022-38752", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38752", }, { cve: "CVE-2022-39028", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39028", }, { cve: "CVE-2022-3903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3903", }, { cve: "CVE-2022-39188", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39188", }, { cve: "CVE-2022-39399", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39399", }, { cve: "CVE-2022-3970", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3970", }, { cve: "CVE-2022-40149", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40149", }, { cve: "CVE-2022-40150", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40150", }, { cve: "CVE-2022-40151", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40151", }, { cve: "CVE-2022-40152", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40152", }, { cve: "CVE-2022-40153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40153", }, { cve: "CVE-2022-40303", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40303", }, { cve: "CVE-2022-40304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40304", }, { cve: "CVE-2022-40307", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40307", }, { cve: "CVE-2022-40674", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40674", }, { cve: "CVE-2022-40768", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40768", }, { cve: "CVE-2022-40899", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40899", }, { cve: "CVE-2022-4095", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4095", }, { cve: "CVE-2022-41218", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41218", }, { cve: "CVE-2022-4129", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4129", }, { cve: "CVE-2022-4141", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4141", }, { cve: "CVE-2022-41717", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41717", }, { cve: "CVE-2022-41721", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41721", }, { cve: "CVE-2022-41848", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41848", }, { cve: "CVE-2022-41850", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41850", }, { cve: "CVE-2022-41854", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41854", }, { cve: "CVE-2022-41858", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41858", }, { cve: "CVE-2022-41881", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41881", }, { cve: "CVE-2022-41903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41903", }, { cve: "CVE-2022-41915", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41915", }, { cve: "CVE-2022-41966", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41966", }, { cve: "CVE-2022-41974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41974", }, { cve: "CVE-2022-42003", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42003", }, { cve: "CVE-2022-42004", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42004", }, { cve: "CVE-2022-42010", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42010", }, { cve: "CVE-2022-42011", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42011", }, { cve: "CVE-2022-42012", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42012", }, { cve: "CVE-2022-42328", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42328", }, { cve: "CVE-2022-42329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42329", }, { cve: "CVE-2022-42703", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42703", }, { cve: "CVE-2022-42889", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42889", }, { cve: "CVE-2022-42895", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42895", }, { cve: "CVE-2022-42896", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42896", }, { cve: "CVE-2022-42898", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42898", }, { cve: "CVE-2022-4292", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4292", }, { cve: "CVE-2022-4293", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4293", }, { cve: "CVE-2022-42969", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42969", }, { cve: "CVE-2022-4304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4304", }, { cve: "CVE-2022-43552", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43552", }, { cve: "CVE-2022-43680", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43680", }, { cve: "CVE-2022-43750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43750", }, { cve: "CVE-2022-4378", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4378", }, { cve: "CVE-2022-43945", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43945", }, { cve: "CVE-2022-43995", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43995", }, { cve: "CVE-2022-4415", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4415", }, { cve: "CVE-2022-4450", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4450", }, { cve: "CVE-2022-44638", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-44638", }, { cve: "CVE-2022-45061", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45061", }, { cve: "CVE-2022-45688", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45688", }, { cve: "CVE-2022-45884", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45884", }, { cve: "CVE-2022-45885", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45885", }, { cve: "CVE-2022-45886", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45886", }, { cve: "CVE-2022-45887", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45887", }, { cve: "CVE-2022-45919", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45919", }, { cve: "CVE-2022-45934", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45934", }, { cve: "CVE-2022-45939", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45939", }, { cve: "CVE-2022-4662", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4662", }, { cve: "CVE-2022-46751", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-46751", }, { cve: "CVE-2022-46908", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-46908", }, { cve: "CVE-2022-47629", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-47629", }, { cve: "CVE-2022-47929", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-47929", }, { cve: "CVE-2022-48281", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48281", }, { cve: "CVE-2022-48337", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48337", }, { cve: "CVE-2022-48339", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48339", }, { cve: "CVE-2023-0045", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0045", }, { cve: "CVE-2023-0049", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0049", }, { cve: "CVE-2023-0051", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0051", }, { cve: "CVE-2023-0054", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0054", }, { cve: "CVE-2023-0215", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0215", }, { cve: "CVE-2023-0286", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0286", }, { cve: "CVE-2023-0288", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0288", }, { cve: "CVE-2023-0433", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0433", }, { cve: "CVE-2023-0464", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0464", }, { cve: "CVE-2023-0465", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0465", }, { cve: "CVE-2023-0466", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0466", }, { cve: "CVE-2023-0512", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0512", }, { cve: "CVE-2023-0590", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0590", }, { cve: "CVE-2023-0597", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0597", }, { cve: "CVE-2023-0833", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0833", }, { cve: "CVE-2023-1076", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1076", }, { cve: "CVE-2023-1095", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1095", }, { cve: "CVE-2023-1118", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1118", }, { cve: "CVE-2023-1127", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1127", }, { cve: "CVE-2023-1170", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1170", }, { cve: "CVE-2023-1175", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1175", }, { cve: "CVE-2023-1370", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1370", }, { cve: "CVE-2023-1380", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1380", }, { cve: "CVE-2023-1390", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1390", }, { cve: "CVE-2023-1436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1436", }, { cve: "CVE-2023-1513", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1513", }, { cve: "CVE-2023-1611", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1611", }, { cve: "CVE-2023-1670", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1670", }, { cve: "CVE-2023-1855", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1855", }, { cve: "CVE-2023-1989", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1989", }, { cve: "CVE-2023-1990", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1990", }, { cve: "CVE-2023-1998", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1998", }, { cve: "CVE-2023-20862", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-20862", }, { cve: "CVE-2023-2124", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2124", }, { cve: "CVE-2023-2162", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2162", }, { cve: "CVE-2023-2176", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2176", }, { cve: "CVE-2023-21830", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21830", }, { cve: "CVE-2023-21835", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21835", }, { cve: "CVE-2023-21843", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21843", }, { cve: "CVE-2023-21930", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21930", }, { cve: "CVE-2023-21937", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21937", }, { cve: "CVE-2023-21938", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21938", }, { cve: "CVE-2023-21939", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21939", }, { cve: "CVE-2023-2194", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2194", }, { cve: "CVE-2023-21954", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21954", }, { cve: "CVE-2023-21967", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21967", }, { cve: "CVE-2023-21968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21968", }, { cve: "CVE-2023-22490", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-22490", }, { cve: "CVE-2023-2253", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2253", }, { cve: "CVE-2023-22809", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-22809", }, { cve: "CVE-2023-23454", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23454", }, { cve: "CVE-2023-23455", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23455", }, { cve: "CVE-2023-23559", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23559", }, { cve: "CVE-2023-23916", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23916", }, { cve: "CVE-2023-23946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23946", }, { cve: "CVE-2023-24329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24329", }, { cve: "CVE-2023-24532", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24532", }, { cve: "CVE-2023-24534", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24534", }, { cve: "CVE-2023-2483", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2483", }, { cve: "CVE-2023-24998", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24998", }, { cve: "CVE-2023-2513", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2513", }, { cve: "CVE-2023-25193", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25193", }, { cve: "CVE-2023-25652", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25652", }, { cve: "CVE-2023-25690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25690", }, { cve: "CVE-2023-25809", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25809", }, { cve: "CVE-2023-25815", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25815", }, { cve: "CVE-2023-26048", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26048", }, { cve: "CVE-2023-26049", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26049", }, { cve: "CVE-2023-2650", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2650", }, { cve: "CVE-2023-26545", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26545", }, { cve: "CVE-2023-26604", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26604", }, { cve: "CVE-2023-27533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27533", }, { cve: "CVE-2023-27534", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27534", }, { cve: "CVE-2023-27535", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27535", }, { cve: "CVE-2023-27536", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27536", }, { cve: "CVE-2023-27538", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27538", }, { cve: "CVE-2023-27561", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27561", }, { cve: "CVE-2023-2828", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2828", }, { cve: "CVE-2023-28320", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28320", }, { cve: "CVE-2023-28321", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28321", }, { cve: "CVE-2023-28322", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28322", }, { cve: "CVE-2023-28328", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28328", }, { cve: "CVE-2023-28464", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28464", }, { cve: "CVE-2023-28486", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28486", }, { cve: "CVE-2023-28487", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28487", }, { cve: "CVE-2023-28642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28642", }, { cve: "CVE-2023-28772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28772", }, { cve: "CVE-2023-28840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28840", }, { cve: "CVE-2023-28841", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28841", }, { cve: "CVE-2023-28842", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28842", }, { cve: "CVE-2023-29007", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29007", }, { cve: "CVE-2023-29383", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29383", }, { cve: "CVE-2023-29402", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29402", }, { cve: "CVE-2023-29406", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29406", }, { cve: "CVE-2023-29409", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29409", }, { cve: "CVE-2023-2976", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2976", }, { cve: "CVE-2023-30630", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-30630", }, { cve: "CVE-2023-30772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-30772", }, { cve: "CVE-2023-31084", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31084", }, { cve: "CVE-2023-3138", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-3138", }, { cve: "CVE-2023-31436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31436", }, { cve: "CVE-2023-31484", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31484", }, { cve: "CVE-2023-32269", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-32269", }, { cve: "CVE-2023-32697", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-32697", }, { cve: "CVE-2023-33264", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-33264", }, { cve: "CVE-2023-34034", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34034", }, { cve: "CVE-2023-34035", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34035", }, { cve: "CVE-2023-34453", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34453", }, { cve: "CVE-2023-34454", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34454", }, { cve: "CVE-2023-34455", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34455", }, { cve: "CVE-2023-34462", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34462", }, { cve: "CVE-2023-35116", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-35116", }, { cve: "CVE-2023-3635", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-3635", }, { cve: "CVE-2023-36479", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-36479", }, { cve: "CVE-2023-39533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-39533", }, { cve: "CVE-2023-40167", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-40167", }, { cve: "CVE-2023-40217", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-40217", }, { cve: "CVE-2023-41105", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-41105", }, { cve: "CVE-2023-41900", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-41900", }, { cve: "CVE-2023-43642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-43642", }, { cve: "CVE-2023-43804", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-43804", }, { cve: "CVE-2023-44487", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-44487", }, { cve: "CVE-2023-45803", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-45803", }, { cve: "CVE-2024-21626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2024-21626", }, ], }
wid-sec-w-2022-0778
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "kritisch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- MacOS X", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0778 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0778.json", }, { category: "self", summary: "WID-SEC-2022-0778 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0778", }, { category: "external", summary: "Apple Security Advisroy vom 2022-07-20", url: "https://support.apple.com/en-us/HT213343", }, { category: "external", summary: "Apple Security Advisroy vom 2022-07-20", url: "https://support.apple.com/en-us/HT213344", }, { category: "external", summary: "Apple Security Advisroy vom 2022-07-20", url: "https://support.apple.com/en-us/HT213345", }, ], source_lang: "en-US", title: "Apple macOS: Mehrere Schwachstellen", tracking: { current_release_date: "2023-06-21T22:00:00.000+00:00", generator: { date: "2024-08-15T17:32:09.203+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0778", initial_release_date: "2022-07-20T22:00:00.000+00:00", revision_history: [ { date: "2022-07-20T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-07-21T22:00:00.000+00:00", number: "2", summary: "Referenz ergänzt", }, { date: "2022-09-20T22:00:00.000+00:00", number: "3", summary: "CVE Nummern CVE-2022-32861, CVE-2022-32863, CVE-2022-32880 ergänzt", }, { date: "2022-10-06T22:00:00.000+00:00", number: "4", summary: "CVE ergänzt", }, { date: "2023-06-21T22:00:00.000+00:00", number: "5", summary: "CVE-2022-32885, CVE-2022-32948, CVE-2022-42805, CVE-2022-48503, CVE-2022-32860 ergänzt", }, ], status: "final", version: "5", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Apple macOS Catalina < 2022-005", product: { name: "Apple macOS Catalina < 2022-005", product_id: "T023996", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:catalina__2022-005", }, }, }, { category: "product_name", name: "Apple macOS Big Sur < 11.6.8", product: { name: "Apple macOS Big Sur < 11.6.8", product_id: "T023997", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:big_sur__11.6.8", }, }, }, { category: "product_name", name: "Apple macOS Monterey < 12.5", product: { name: "Apple macOS Monterey < 12.5", product_id: "T023998", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:monterey__12.5", }, }, }, ], category: "product_name", name: "macOS", }, ], category: "vendor", name: "Apple", }, ], }, vulnerabilities: [ { cve: "CVE-2022-48503", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-48503", }, { cve: "CVE-2022-42805", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-42805", }, { cve: "CVE-2022-32948", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32948", }, { cve: "CVE-2022-32910", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32910", }, { cve: "CVE-2022-32885", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32885", }, { cve: "CVE-2022-32880", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32880", }, { cve: "CVE-2022-32863", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32863", }, { cve: "CVE-2022-32861", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32861", }, { cve: "CVE-2022-32860", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32860", }, { cve: "CVE-2022-32857", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32857", }, { cve: "CVE-2022-32853", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32853", }, { cve: "CVE-2022-32852", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32852", }, { cve: "CVE-2022-32851", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32851", }, { cve: "CVE-2022-32849", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32849", }, { cve: "CVE-2022-32848", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32848", }, { cve: "CVE-2022-32847", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32847", }, { cve: "CVE-2022-32845", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32845", }, { cve: "CVE-2022-32843", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32843", }, { cve: "CVE-2022-32842", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32842", }, { cve: "CVE-2022-32841", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32841", }, { cve: "CVE-2022-32840", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32840", }, { cve: "CVE-2022-32839", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32839", }, { cve: "CVE-2022-32838", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32838", }, { cve: "CVE-2022-32837", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32837", }, { cve: "CVE-2022-32834", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32834", }, { cve: "CVE-2022-32832", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32832", }, { cve: "CVE-2022-32831", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32831", }, { cve: "CVE-2022-32829", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32829", }, { cve: "CVE-2022-32828", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32828", }, { cve: "CVE-2022-32826", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32826", }, { cve: "CVE-2022-32825", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32825", }, { cve: "CVE-2022-32823", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32823", }, { cve: "CVE-2022-32821", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32821", }, { cve: "CVE-2022-32820", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32820", }, { cve: "CVE-2022-32819", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32819", }, { cve: "CVE-2022-32818", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32818", }, { cve: "CVE-2022-32817", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32817", }, { cve: "CVE-2022-32816", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32816", }, { cve: "CVE-2022-32815", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32815", }, { cve: "CVE-2022-32814", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32814", }, { cve: "CVE-2022-32813", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32813", }, { cve: "CVE-2022-32812", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32812", }, { cve: "CVE-2022-32811", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32811", }, { cve: "CVE-2022-32810", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32810", }, { cve: "CVE-2022-32807", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32807", }, { cve: "CVE-2022-32805", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32805", }, { cve: "CVE-2022-32801", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32801", }, { cve: "CVE-2022-32800", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32800", }, { cve: "CVE-2022-32799", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32799", }, { cve: "CVE-2022-32798", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32798", }, { cve: "CVE-2022-32797", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32797", }, { cve: "CVE-2022-32796", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32796", }, { cve: "CVE-2022-32793", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32793", }, { cve: "CVE-2022-32792", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32792", }, { cve: "CVE-2022-32789", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32789", }, { cve: "CVE-2022-32787", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32787", }, { cve: "CVE-2022-32786", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32786", }, { cve: "CVE-2022-32785", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32785", }, { cve: "CVE-2022-32781", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32781", }, { cve: "CVE-2022-29048", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-29048", }, { cve: "CVE-2022-29046", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-29046", }, { cve: "CVE-2022-26981", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-26981", }, { cve: "CVE-2022-26704", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-26704", }, { cve: "CVE-2022-24070", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-24070", }, { cve: "CVE-2022-2294", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-2294", }, { cve: "CVE-2022-0158", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-0158", }, { cve: "CVE-2022-0156", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-0156", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2021-46059", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2021-46059", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4187", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2021-4187", }, { cve: "CVE-2021-4173", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2021-4173", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2021-28544", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2021-28544", }, ], }
WID-SEC-W-2022-0778
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "kritisch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen.", title: "Angriff", }, { category: "general", text: "- MacOS X", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0778 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0778.json", }, { category: "self", summary: "WID-SEC-2022-0778 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0778", }, { category: "external", summary: "Apple Security Advisroy vom 2022-07-20", url: "https://support.apple.com/en-us/HT213343", }, { category: "external", summary: "Apple Security Advisroy vom 2022-07-20", url: "https://support.apple.com/en-us/HT213344", }, { category: "external", summary: "Apple Security Advisroy vom 2022-07-20", url: "https://support.apple.com/en-us/HT213345", }, ], source_lang: "en-US", title: "Apple macOS: Mehrere Schwachstellen", tracking: { current_release_date: "2023-06-21T22:00:00.000+00:00", generator: { date: "2024-08-15T17:32:09.203+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0778", initial_release_date: "2022-07-20T22:00:00.000+00:00", revision_history: [ { date: "2022-07-20T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-07-21T22:00:00.000+00:00", number: "2", summary: "Referenz ergänzt", }, { date: "2022-09-20T22:00:00.000+00:00", number: "3", summary: "CVE Nummern CVE-2022-32861, CVE-2022-32863, CVE-2022-32880 ergänzt", }, { date: "2022-10-06T22:00:00.000+00:00", number: "4", summary: "CVE ergänzt", }, { date: "2023-06-21T22:00:00.000+00:00", number: "5", summary: "CVE-2022-32885, CVE-2022-32948, CVE-2022-42805, CVE-2022-48503, CVE-2022-32860 ergänzt", }, ], status: "final", version: "5", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Apple macOS Catalina < 2022-005", product: { name: "Apple macOS Catalina < 2022-005", product_id: "T023996", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:catalina__2022-005", }, }, }, { category: "product_name", name: "Apple macOS Big Sur < 11.6.8", product: { name: "Apple macOS Big Sur < 11.6.8", product_id: "T023997", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:big_sur__11.6.8", }, }, }, { category: "product_name", name: "Apple macOS Monterey < 12.5", product: { name: "Apple macOS Monterey < 12.5", product_id: "T023998", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:monterey__12.5", }, }, }, ], category: "product_name", name: "macOS", }, ], category: "vendor", name: "Apple", }, ], }, vulnerabilities: [ { cve: "CVE-2022-48503", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-48503", }, { cve: "CVE-2022-42805", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-42805", }, { cve: "CVE-2022-32948", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32948", }, { cve: "CVE-2022-32910", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32910", }, { cve: "CVE-2022-32885", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32885", }, { cve: "CVE-2022-32880", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32880", }, { cve: "CVE-2022-32863", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32863", }, { cve: "CVE-2022-32861", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32861", }, { cve: "CVE-2022-32860", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32860", }, { cve: "CVE-2022-32857", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32857", }, { cve: "CVE-2022-32853", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32853", }, { cve: "CVE-2022-32852", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32852", }, { cve: "CVE-2022-32851", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32851", }, { cve: "CVE-2022-32849", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32849", }, { cve: "CVE-2022-32848", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32848", }, { cve: "CVE-2022-32847", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32847", }, { cve: "CVE-2022-32845", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32845", }, { cve: "CVE-2022-32843", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32843", }, { cve: "CVE-2022-32842", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32842", }, { cve: "CVE-2022-32841", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32841", }, { cve: "CVE-2022-32840", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32840", }, { cve: "CVE-2022-32839", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32839", }, { cve: "CVE-2022-32838", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32838", }, { cve: "CVE-2022-32837", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32837", }, { cve: "CVE-2022-32834", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32834", }, { cve: "CVE-2022-32832", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32832", }, { cve: "CVE-2022-32831", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32831", }, { cve: "CVE-2022-32829", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32829", }, { cve: "CVE-2022-32828", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32828", }, { cve: "CVE-2022-32826", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32826", }, { cve: "CVE-2022-32825", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32825", }, { cve: "CVE-2022-32823", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32823", }, { cve: "CVE-2022-32821", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32821", }, { cve: "CVE-2022-32820", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32820", }, { cve: "CVE-2022-32819", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32819", }, { cve: "CVE-2022-32818", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32818", }, { cve: "CVE-2022-32817", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32817", }, { cve: "CVE-2022-32816", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32816", }, { cve: "CVE-2022-32815", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32815", }, { cve: "CVE-2022-32814", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32814", }, { cve: "CVE-2022-32813", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32813", }, { cve: "CVE-2022-32812", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32812", }, { cve: "CVE-2022-32811", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32811", }, { cve: "CVE-2022-32810", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32810", }, { cve: "CVE-2022-32807", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32807", }, { cve: "CVE-2022-32805", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32805", }, { cve: "CVE-2022-32801", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32801", }, { cve: "CVE-2022-32800", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32800", }, { cve: "CVE-2022-32799", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32799", }, { cve: "CVE-2022-32798", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32798", }, { cve: "CVE-2022-32797", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32797", }, { cve: "CVE-2022-32796", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32796", }, { cve: "CVE-2022-32793", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32793", }, { cve: "CVE-2022-32792", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32792", }, { cve: "CVE-2022-32789", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32789", }, { cve: "CVE-2022-32787", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32787", }, { cve: "CVE-2022-32786", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32786", }, { cve: "CVE-2022-32785", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32785", }, { cve: "CVE-2022-32781", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-32781", }, { cve: "CVE-2022-29048", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-29048", }, { cve: "CVE-2022-29046", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-29046", }, { cve: "CVE-2022-26981", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-26981", }, { cve: "CVE-2022-26704", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-26704", }, { cve: "CVE-2022-24070", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-24070", }, { cve: "CVE-2022-2294", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-2294", }, { cve: "CVE-2022-0158", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-0158", }, { cve: "CVE-2022-0156", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-0156", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2021-46059", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2021-46059", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4187", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2021-4187", }, { cve: "CVE-2021-4173", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2021-4173", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2021-28544", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten APFS, AppleMobileFileIntegrity, Apple Neural Engine, AppleScript, Audio, Automation, Calendar, CoreMedia, CoreText, FaceTime, File System Events, GPU Drivers, iCloud Photo Library, ICU, ImageIO, Intel Graphics Driver, Kernel, Liblouis, libxml2, Multi-Touch, PackageKit, PluginKit, PS Normalizer, SMB, Software Update, Spindump, Spotlight, subversion, TCC, Vim, Wi-Fi und Windows Server. Ein Angreifer aus dem benachbarten Netzwerk oder ein entfernter, anonymer, authentifizierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-07-20T22:00:00.000+00:00", title: "CVE-2021-28544", }, ], }
wid-sec-w-2022-1057
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "kritisch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren.", title: "Angriff", }, { category: "general", text: "- MacOS X", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1057 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1057.json", }, { category: "self", summary: "WID-SEC-2022-1057 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1057", }, { category: "external", summary: "Apple Security Advisory vom 2022-05-16", url: "https://support.apple.com/en-us/HT213255", }, { category: "external", summary: "Apple Security Advisory vom 2022-05-16", url: "https://support.apple.com/en-us/HT213256", }, { category: "external", summary: "Apple Security Advisory vom 2022-05-16", url: "https://support.apple.com/en-us/HT213257", }, { category: "external", summary: "PoC CVE-2022-26726", url: "https://github.com/acheong08/CVE-2022-26726-POC", }, { category: "external", summary: "CISA: Apple Releases Security Updates", url: "https://www.cisa.gov/uscert/ncas/current-activity/2022/04/01/apple-releases-security-updates-0", }, { category: "external", summary: "Debian Security Advisory DLA-3118 vom 2022-09-22", url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00028.html", }, { category: "external", summary: "Wojciech Regula blogpost vom 2022-11-21", url: "https://wojciechregula.blog/post/macos-sandbox-escape-via-terminal/", }, ], source_lang: "en-US", title: "Apple macOS: Mehrere Schwachstellen", tracking: { current_release_date: "2023-06-21T22:00:00.000+00:00", generator: { date: "2024-08-15T17:33:27.405+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-1057", initial_release_date: "2022-05-16T22:00:00.000+00:00", revision_history: [ { date: "2022-05-16T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-08-16T22:00:00.000+00:00", number: "2", summary: "CVE ergänzt", }, { date: "2022-09-20T22:00:00.000+00:00", number: "3", summary: "CVE Nummern CVE-2022-32790 und CVE-2022-32882 ergänzt", }, { date: "2022-09-22T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-09-25T22:00:00.000+00:00", number: "5", summary: "Korrektur bzgl. fehlerhaft eingetragenem Debian Update", }, { date: "2022-11-21T23:00:00.000+00:00", number: "6", summary: "Exploit aufgenommen", }, { date: "2023-06-21T22:00:00.000+00:00", number: "7", summary: "CVE-2022-32794 ergänzt", }, ], status: "final", version: "7", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Apple macOS Catalina < 2022-004", product: { name: "Apple macOS Catalina < 2022-004", product_id: "T023230", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:catalina__2022-004", }, }, }, { category: "product_name", name: "Apple macOS Big Sur < 11.6.6", product: { name: "Apple macOS Big Sur < 11.6.6", product_id: "T023231", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:big_sur__11.6.6", }, }, }, { category: "product_name", name: "Apple macOS Monterey < 12.4", product: { name: "Apple macOS Monterey < 12.4", product_id: "T023232", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:monterey__12.4", }, }, }, ], category: "product_name", name: "macOS", }, ], category: "vendor", name: "Apple", }, ], }, vulnerabilities: [ { cve: "CVE-2022-32882", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-32882", }, { cve: "CVE-2022-32794", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-32794", }, { cve: "CVE-2022-32790", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-32790", }, { cve: "CVE-2022-26776", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26776", }, { cve: "CVE-2022-26775", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26775", }, { cve: "CVE-2022-26772", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26772", }, { cve: "CVE-2022-26770", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26770", }, { cve: "CVE-2022-26769", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26769", }, { cve: "CVE-2022-26768", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26768", }, { cve: "CVE-2022-26767", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26767", }, { cve: "CVE-2022-26766", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26766", }, { cve: "CVE-2022-26765", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26765", }, { cve: "CVE-2022-26764", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26764", }, { cve: "CVE-2022-26763", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26763", }, { cve: "CVE-2022-26762", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26762", }, { cve: "CVE-2022-26761", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26761", }, { cve: "CVE-2022-26757", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26757", }, { cve: "CVE-2022-26756", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26756", }, { cve: "CVE-2022-26755", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26755", }, { cve: "CVE-2022-26754", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26754", }, { cve: "CVE-2022-26753", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26753", }, { cve: "CVE-2022-26752", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26752", }, { cve: "CVE-2022-26751", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26751", }, { cve: "CVE-2022-26750", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26750", }, { cve: "CVE-2022-26749", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26749", }, { cve: "CVE-2022-26748", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26748", }, { cve: "CVE-2022-26746", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26746", }, { cve: "CVE-2022-26745", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26745", }, { cve: "CVE-2022-26743", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26743", }, { cve: "CVE-2022-26742", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26742", }, { cve: "CVE-2022-26741", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26741", }, { cve: "CVE-2022-26740", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26740", }, { cve: "CVE-2022-26739", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26739", }, { cve: "CVE-2022-26738", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26738", }, { cve: "CVE-2022-26737", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26737", }, { cve: "CVE-2022-26736", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26736", }, { cve: "CVE-2022-26731", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26731", }, { cve: "CVE-2022-26728", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26728", }, { cve: "CVE-2022-26727", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26727", }, { cve: "CVE-2022-26726", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26726", }, { cve: "CVE-2022-26725", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26725", }, { cve: "CVE-2022-26723", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26723", }, { cve: "CVE-2022-26722", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26722", }, { cve: "CVE-2022-26721", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26721", }, { cve: "CVE-2022-26720", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26720", }, { cve: "CVE-2022-26719", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26719", }, { cve: "CVE-2022-26718", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26718", }, { cve: "CVE-2022-26717", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26717", }, { cve: "CVE-2022-26716", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26716", }, { cve: "CVE-2022-26715", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26715", }, { cve: "CVE-2022-26714", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26714", }, { cve: "CVE-2022-26712", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26712", }, { cve: "CVE-2022-26711", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26711", }, { cve: "CVE-2022-26710", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26710", }, { cve: "CVE-2022-26709", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26709", }, { cve: "CVE-2022-26708", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26708", }, { cve: "CVE-2022-26706", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26706", }, { cve: "CVE-2022-26704", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26704", }, { cve: "CVE-2022-26701", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26701", }, { cve: "CVE-2022-26700", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26700", }, { cve: "CVE-2022-26698", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26698", }, { cve: "CVE-2022-26697", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26697", }, { cve: "CVE-2022-26696", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26696", }, { cve: "CVE-2022-26694", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26694", }, { cve: "CVE-2022-26693", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26693", }, { cve: "CVE-2022-23308", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-23308", }, { cve: "CVE-2022-22721", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22721", }, { cve: "CVE-2022-22720", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22720", }, { cve: "CVE-2022-22719", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22719", }, { cve: "CVE-2022-22677", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22677", }, { cve: "CVE-2022-22675", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22675", }, { cve: "CVE-2022-22674", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22674", }, { cve: "CVE-2022-22665", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22665", }, { cve: "CVE-2022-22663", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22663", }, { cve: "CVE-2022-22589", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22589", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-0530", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-0530", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2021-46059", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-46059", }, { cve: "CVE-2021-45444", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-45444", }, { cve: "CVE-2021-44790", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-44790", }, { cve: "CVE-2021-44224", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-44224", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4187", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-4187", }, { cve: "CVE-2021-4173", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-4173", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2018-25032", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2018-25032", }, ], }
WID-SEC-W-2022-1335
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", title: "Angriff", }, { category: "general", text: "- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1335 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1335.json", }, { category: "self", summary: "WID-SEC-2022-1335 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1335", }, { category: "external", summary: "XEROX Security Advisory XRX23-007 vom 2023-05-18", url: "https://security.business.xerox.com/wp-content/uploads/2023/05/Xerox-Security-Bulletin-XRX23-007-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf", }, { category: "external", summary: "XEROX Security Advisory XRX23-005 vom 2023-04-04", url: "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf", }, { category: "external", summary: "Xerox Security Bulletin XRX22-021 vom 2022-09-07", url: "https://securitydocs.business.xerox.com/wp-content/uploads/2022/09/Xerox-Security-Bulletin-XRX22-021-FreeFlow-Print-Server-v9.pdf", }, ], source_lang: "en-US", title: "Xerox FreeFlow Print Server: Mehrere Schwachstellen", tracking: { current_release_date: "2023-05-18T22:00:00.000+00:00", generator: { date: "2024-08-15T17:34:44.234+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-1335", initial_release_date: "2022-09-07T22:00:00.000+00:00", revision_history: [ { date: "2022-09-07T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-04-03T22:00:00.000+00:00", number: "2", summary: "Neue Updates von XEROX aufgenommen", }, { date: "2023-05-18T22:00:00.000+00:00", number: "3", summary: "Neue Updates von XEROX aufgenommen", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Xerox FreeFlow Print Server 7", product: { name: "Xerox FreeFlow Print Server 7", product_id: "T000872", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:7", }, }, }, { category: "product_name", name: "Xerox FreeFlow Print Server 9", product: { name: "Xerox FreeFlow Print Server 9", product_id: "T002977", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:9", }, }, }, { category: "product_name", name: "Xerox FreeFlow Print Server v9", product: { name: "Xerox FreeFlow Print Server v9", product_id: "T015632", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:v9", }, }, }, ], category: "product_name", name: "FreeFlow Print Server", }, ], category: "vendor", name: "Xerox", }, ], }, vulnerabilities: [ { cve: "CVE-2018-25032", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2018-25032", }, { cve: "CVE-2019-19906", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2019-19906", }, { cve: "CVE-2020-0499", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2020-0499", }, { cve: "CVE-2020-25717", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2020-25717", }, { cve: "CVE-2020-29651", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2020-29651", }, { cve: "CVE-2021-0561", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-0561", }, { cve: "CVE-2021-21708", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-21708", }, { cve: "CVE-2021-22946", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-22946", }, { cve: "CVE-2021-25220", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-25220", }, { cve: "CVE-2021-29923", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-29923", }, { cve: "CVE-2021-30809", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30809", }, { cve: "CVE-2021-30818", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30818", }, { cve: "CVE-2021-30823", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30823", }, { cve: "CVE-2021-30836", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30836", }, { cve: "CVE-2021-30884", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30884", }, { cve: "CVE-2021-30887", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30887", }, { cve: "CVE-2021-30888", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30888", }, { cve: "CVE-2021-30889", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30889", }, { cve: "CVE-2021-30890", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30890", }, { cve: "CVE-2021-30897", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30897", }, { cve: "CVE-2021-30934", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30934", }, { cve: "CVE-2021-30936", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30936", }, { cve: "CVE-2021-30951", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30951", }, { cve: "CVE-2021-30952", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30952", }, { cve: "CVE-2021-30953", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30953", }, { cve: "CVE-2021-30954", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30954", }, { cve: "CVE-2021-30984", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30984", }, { cve: "CVE-2021-3448", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-3448", }, { cve: "CVE-2021-34558", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-34558", }, { cve: "CVE-2021-36221", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-36221", }, { cve: "CVE-2021-4115", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4115", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-4173", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4173", }, { cve: "CVE-2021-41771", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-41771", }, { cve: "CVE-2021-41772", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-41772", }, { cve: "CVE-2021-4187", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4187", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4217", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4217", }, { cve: "CVE-2021-43519", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-43519", }, { cve: "CVE-2021-43566", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-43566", }, { cve: "CVE-2021-44142", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-44142", }, { cve: "CVE-2021-45444", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45444", }, { cve: "CVE-2021-45481", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45481", }, { cve: "CVE-2021-45482", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45482", }, { cve: "CVE-2021-45483", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45483", }, { cve: "CVE-2021-45960", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45960", }, { cve: "CVE-2021-46143", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-46143", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2022-0156", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0156", }, { cve: "CVE-2022-0158", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0158", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0336", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0336", }, { cve: "CVE-2022-0391", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0391", }, { cve: "CVE-2022-0408", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0408", }, { cve: "CVE-2022-0413", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0413", }, { cve: "CVE-2022-0417", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0417", }, { cve: "CVE-2022-0443", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0443", }, { cve: "CVE-2022-0554", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0554", }, { cve: "CVE-2022-0566", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0566", }, { cve: "CVE-2022-0572", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0572", }, { cve: "CVE-2022-0629", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0629", }, { cve: "CVE-2022-0685", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0685", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0714", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0714", }, { cve: "CVE-2022-0729", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0729", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-1097", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1097", }, { cve: "CVE-2022-1196", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1196", }, { cve: "CVE-2022-1197", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1197", }, { cve: "CVE-2022-1271", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1271", }, { cve: "CVE-2022-1520", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1520", }, { cve: "CVE-2022-1834", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1834", }, { cve: "CVE-2022-21245", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21245", }, { cve: "CVE-2022-21270", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21270", }, { cve: "CVE-2022-21291", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21291", }, { cve: "CVE-2022-21303", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21303", }, { cve: "CVE-2022-21304", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21304", }, { cve: "CVE-2022-21344", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21344", }, { cve: "CVE-2022-21349", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21349", }, { cve: "CVE-2022-21367", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21367", }, { cve: "CVE-2022-21426", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21426", }, { cve: "CVE-2022-21434", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21434", }, { cve: "CVE-2022-21443", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21443", }, { cve: "CVE-2022-21449", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21449", }, { cve: "CVE-2022-21476", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21476", }, { cve: "CVE-2022-21493", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21493", }, { cve: "CVE-2022-21494", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21494", }, { cve: "CVE-2022-21496", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21496", }, { cve: "CVE-2022-21514", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21514", }, { cve: "CVE-2022-21524", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21524", }, { cve: "CVE-2022-21533", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21533", }, { cve: "CVE-2022-21712", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21712", }, { cve: "CVE-2022-21716", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21716", }, { cve: "CVE-2022-22589", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22589", }, { cve: "CVE-2022-22590", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22590", }, { cve: "CVE-2022-22592", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22592", }, { cve: "CVE-2022-22620", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22620", }, { cve: "CVE-2022-22719", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22719", }, { cve: "CVE-2022-22720", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22720", }, { cve: "CVE-2022-22721", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22721", }, { cve: "CVE-2022-22818", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22818", }, { cve: "CVE-2022-22822", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22822", }, { cve: "CVE-2022-22823", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22823", }, { cve: "CVE-2022-22824", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22824", }, { cve: "CVE-2022-22825", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22825", }, { cve: "CVE-2022-22826", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22826", }, { cve: "CVE-2022-22827", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22827", }, { cve: "CVE-2022-23308", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23308", }, { cve: "CVE-2022-23772", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23772", }, { cve: "CVE-2022-23773", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23773", }, { cve: "CVE-2022-23806", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23806", }, { cve: "CVE-2022-23833", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23833", }, { cve: "CVE-2022-23852", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23852", }, { cve: "CVE-2022-23943", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23943", }, { cve: "CVE-2022-23990", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23990", }, { cve: "CVE-2022-24130", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24130", }, { cve: "CVE-2022-24407", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24407", }, { cve: "CVE-2022-24675", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24675", }, { cve: "CVE-2022-24713", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24713", }, { cve: "CVE-2022-24801", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24801", }, { cve: "CVE-2022-25235", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25235", }, { cve: "CVE-2022-25236", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25236", }, { cve: "CVE-2022-25313", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25313", }, { cve: "CVE-2022-25314", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25314", }, { cve: "CVE-2022-25315", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25315", }, { cve: "CVE-2022-25762", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25762", }, { cve: "CVE-2022-26381", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26381", }, { cve: "CVE-2022-26383", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26383", }, { cve: "CVE-2022-26384", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26384", }, { cve: "CVE-2022-26386", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26386", }, { cve: "CVE-2022-26387", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26387", }, { cve: "CVE-2022-26485", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26485", }, { cve: "CVE-2022-26486", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26486", }, { cve: "CVE-2022-28281", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28281", }, { cve: "CVE-2022-28282", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28282", }, { cve: "CVE-2022-28285", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28285", }, { cve: "CVE-2022-28286", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28286", }, { cve: "CVE-2022-28289", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28289", }, { cve: "CVE-2022-28327", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28327", }, { cve: "CVE-2022-28346", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28346", }, { cve: "CVE-2022-28347", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28347", }, { cve: "CVE-2022-29824", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29824", }, { cve: "CVE-2022-29909", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29909", }, { cve: "CVE-2022-29911", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29911", }, { cve: "CVE-2022-29912", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29912", }, { cve: "CVE-2022-29913", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29913", }, { cve: "CVE-2022-29914", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29914", }, { cve: "CVE-2022-29916", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29916", }, { cve: "CVE-2022-29917", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29917", }, { cve: "CVE-2022-31736", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31736", }, { cve: "CVE-2022-31737", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31737", }, { cve: "CVE-2022-31738", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31738", }, { cve: "CVE-2022-31739", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31739", }, { cve: "CVE-2022-3174", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-3174", }, { cve: "CVE-2022-31740", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31740", }, { cve: "CVE-2022-31741", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31741", }, { cve: "CVE-2022-31742", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31742", }, { cve: "CVE-2022-31747", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31747", }, { cve: "CVE-2022-4187", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-4187", }, ], }
WID-SEC-W-2022-1057
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "kritisch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren.", title: "Angriff", }, { category: "general", text: "- MacOS X", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1057 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1057.json", }, { category: "self", summary: "WID-SEC-2022-1057 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1057", }, { category: "external", summary: "Apple Security Advisory vom 2022-05-16", url: "https://support.apple.com/en-us/HT213255", }, { category: "external", summary: "Apple Security Advisory vom 2022-05-16", url: "https://support.apple.com/en-us/HT213256", }, { category: "external", summary: "Apple Security Advisory vom 2022-05-16", url: "https://support.apple.com/en-us/HT213257", }, { category: "external", summary: "PoC CVE-2022-26726", url: "https://github.com/acheong08/CVE-2022-26726-POC", }, { category: "external", summary: "CISA: Apple Releases Security Updates", url: "https://www.cisa.gov/uscert/ncas/current-activity/2022/04/01/apple-releases-security-updates-0", }, { category: "external", summary: "Debian Security Advisory DLA-3118 vom 2022-09-22", url: "https://lists.debian.org/debian-lts-announce/2022/09/msg00028.html", }, { category: "external", summary: "Wojciech Regula blogpost vom 2022-11-21", url: "https://wojciechregula.blog/post/macos-sandbox-escape-via-terminal/", }, ], source_lang: "en-US", title: "Apple macOS: Mehrere Schwachstellen", tracking: { current_release_date: "2023-06-21T22:00:00.000+00:00", generator: { date: "2024-08-15T17:33:27.405+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-1057", initial_release_date: "2022-05-16T22:00:00.000+00:00", revision_history: [ { date: "2022-05-16T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-08-16T22:00:00.000+00:00", number: "2", summary: "CVE ergänzt", }, { date: "2022-09-20T22:00:00.000+00:00", number: "3", summary: "CVE Nummern CVE-2022-32790 und CVE-2022-32882 ergänzt", }, { date: "2022-09-22T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Debian aufgenommen", }, { date: "2022-09-25T22:00:00.000+00:00", number: "5", summary: "Korrektur bzgl. fehlerhaft eingetragenem Debian Update", }, { date: "2022-11-21T23:00:00.000+00:00", number: "6", summary: "Exploit aufgenommen", }, { date: "2023-06-21T22:00:00.000+00:00", number: "7", summary: "CVE-2022-32794 ergänzt", }, ], status: "final", version: "7", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Apple macOS Catalina < 2022-004", product: { name: "Apple macOS Catalina < 2022-004", product_id: "T023230", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:catalina__2022-004", }, }, }, { category: "product_name", name: "Apple macOS Big Sur < 11.6.6", product: { name: "Apple macOS Big Sur < 11.6.6", product_id: "T023231", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:big_sur__11.6.6", }, }, }, { category: "product_name", name: "Apple macOS Monterey < 12.4", product: { name: "Apple macOS Monterey < 12.4", product_id: "T023232", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:monterey__12.4", }, }, }, ], category: "product_name", name: "macOS", }, ], category: "vendor", name: "Apple", }, ], }, vulnerabilities: [ { cve: "CVE-2022-32882", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-32882", }, { cve: "CVE-2022-32794", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-32794", }, { cve: "CVE-2022-32790", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-32790", }, { cve: "CVE-2022-26776", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26776", }, { cve: "CVE-2022-26775", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26775", }, { cve: "CVE-2022-26772", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26772", }, { cve: "CVE-2022-26770", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26770", }, { cve: "CVE-2022-26769", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26769", }, { cve: "CVE-2022-26768", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26768", }, { cve: "CVE-2022-26767", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26767", }, { cve: "CVE-2022-26766", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26766", }, { cve: "CVE-2022-26765", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26765", }, { cve: "CVE-2022-26764", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26764", }, { cve: "CVE-2022-26763", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26763", }, { cve: "CVE-2022-26762", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26762", }, { cve: "CVE-2022-26761", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26761", }, { cve: "CVE-2022-26757", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26757", }, { cve: "CVE-2022-26756", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26756", }, { cve: "CVE-2022-26755", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26755", }, { cve: "CVE-2022-26754", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26754", }, { cve: "CVE-2022-26753", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26753", }, { cve: "CVE-2022-26752", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26752", }, { cve: "CVE-2022-26751", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26751", }, { cve: "CVE-2022-26750", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26750", }, { cve: "CVE-2022-26749", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26749", }, { cve: "CVE-2022-26748", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26748", }, { cve: "CVE-2022-26746", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26746", }, { cve: "CVE-2022-26745", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26745", }, { cve: "CVE-2022-26743", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26743", }, { cve: "CVE-2022-26742", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26742", }, { cve: "CVE-2022-26741", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26741", }, { cve: "CVE-2022-26740", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26740", }, { cve: "CVE-2022-26739", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26739", }, { cve: "CVE-2022-26738", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26738", }, { cve: "CVE-2022-26737", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26737", }, { cve: "CVE-2022-26736", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26736", }, { cve: "CVE-2022-26731", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26731", }, { cve: "CVE-2022-26728", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26728", }, { cve: "CVE-2022-26727", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26727", }, { cve: "CVE-2022-26726", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26726", }, { cve: "CVE-2022-26725", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26725", }, { cve: "CVE-2022-26723", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26723", }, { cve: "CVE-2022-26722", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26722", }, { cve: "CVE-2022-26721", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26721", }, { cve: "CVE-2022-26720", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26720", }, { cve: "CVE-2022-26719", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26719", }, { cve: "CVE-2022-26718", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26718", }, { cve: "CVE-2022-26717", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26717", }, { cve: "CVE-2022-26716", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26716", }, { cve: "CVE-2022-26715", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26715", }, { cve: "CVE-2022-26714", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26714", }, { cve: "CVE-2022-26712", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26712", }, { cve: "CVE-2022-26711", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26711", }, { cve: "CVE-2022-26710", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26710", }, { cve: "CVE-2022-26709", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26709", }, { cve: "CVE-2022-26708", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26708", }, { cve: "CVE-2022-26706", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26706", }, { cve: "CVE-2022-26704", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26704", }, { cve: "CVE-2022-26701", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26701", }, { cve: "CVE-2022-26700", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26700", }, { cve: "CVE-2022-26698", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26698", }, { cve: "CVE-2022-26697", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26697", }, { cve: "CVE-2022-26696", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26696", }, { cve: "CVE-2022-26694", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26694", }, { cve: "CVE-2022-26693", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-26693", }, { cve: "CVE-2022-23308", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-23308", }, { cve: "CVE-2022-22721", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22721", }, { cve: "CVE-2022-22720", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22720", }, { cve: "CVE-2022-22719", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22719", }, { cve: "CVE-2022-22677", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22677", }, { cve: "CVE-2022-22675", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22675", }, { cve: "CVE-2022-22674", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22674", }, { cve: "CVE-2022-22665", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22665", }, { cve: "CVE-2022-22663", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22663", }, { cve: "CVE-2022-22589", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-22589", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-0530", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-0530", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2021-46059", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-46059", }, { cve: "CVE-2021-45444", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-45444", }, { cve: "CVE-2021-44790", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-44790", }, { cve: "CVE-2021-44224", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-44224", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4187", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-4187", }, { cve: "CVE-2021-4173", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-4173", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2018-25032", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten AMD, apache, AppKit, AppleAVD, AppleGraphicsControl, AppleScript, AVEVideoEncoder, Contacts, CoreTypes, CVMS, DriverKit, Graphics Drivers, ImageIO, Intel Graphics Drivers, IOKit, IOMobileFrameBuffer, Kernel, LaunchServices, libresolv, LibreSSL, libxml2, OpenSSL, PackageKit, Vorschau, Drucken, Safari Private Browsing, Sicherheit, SMB, SoftwareUpdate, Spotlight, TCC, Tcl, Vim, WebKit, WebRTC, Wi-Fi, zip, zlib und zsh. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen und im schlimmsten Fall das System zu kompromittieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], release_date: "2022-05-16T22:00:00.000+00:00", title: "CVE-2018-25032", }, ], }
wid-sec-w-2022-1335
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", title: "Angriff", }, { category: "general", text: "- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1335 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1335.json", }, { category: "self", summary: "WID-SEC-2022-1335 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1335", }, { category: "external", summary: "XEROX Security Advisory XRX23-007 vom 2023-05-18", url: "https://security.business.xerox.com/wp-content/uploads/2023/05/Xerox-Security-Bulletin-XRX23-007-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf", }, { category: "external", summary: "XEROX Security Advisory XRX23-005 vom 2023-04-04", url: "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf", }, { category: "external", summary: "Xerox Security Bulletin XRX22-021 vom 2022-09-07", url: "https://securitydocs.business.xerox.com/wp-content/uploads/2022/09/Xerox-Security-Bulletin-XRX22-021-FreeFlow-Print-Server-v9.pdf", }, ], source_lang: "en-US", title: "Xerox FreeFlow Print Server: Mehrere Schwachstellen", tracking: { current_release_date: "2023-05-18T22:00:00.000+00:00", generator: { date: "2024-08-15T17:34:44.234+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-1335", initial_release_date: "2022-09-07T22:00:00.000+00:00", revision_history: [ { date: "2022-09-07T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2023-04-03T22:00:00.000+00:00", number: "2", summary: "Neue Updates von XEROX aufgenommen", }, { date: "2023-05-18T22:00:00.000+00:00", number: "3", summary: "Neue Updates von XEROX aufgenommen", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Xerox FreeFlow Print Server 7", product: { name: "Xerox FreeFlow Print Server 7", product_id: "T000872", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:7", }, }, }, { category: "product_name", name: "Xerox FreeFlow Print Server 9", product: { name: "Xerox FreeFlow Print Server 9", product_id: "T002977", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:9", }, }, }, { category: "product_name", name: "Xerox FreeFlow Print Server v9", product: { name: "Xerox FreeFlow Print Server v9", product_id: "T015632", product_identification_helper: { cpe: "cpe:/a:xerox:freeflow_print_server:v9", }, }, }, ], category: "product_name", name: "FreeFlow Print Server", }, ], category: "vendor", name: "Xerox", }, ], }, vulnerabilities: [ { cve: "CVE-2018-25032", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2018-25032", }, { cve: "CVE-2019-19906", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2019-19906", }, { cve: "CVE-2020-0499", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2020-0499", }, { cve: "CVE-2020-25717", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2020-25717", }, { cve: "CVE-2020-29651", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2020-29651", }, { cve: "CVE-2021-0561", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-0561", }, { cve: "CVE-2021-21708", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-21708", }, { cve: "CVE-2021-22946", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-22946", }, { cve: "CVE-2021-25220", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-25220", }, { cve: "CVE-2021-29923", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-29923", }, { cve: "CVE-2021-30809", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30809", }, { cve: "CVE-2021-30818", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30818", }, { cve: "CVE-2021-30823", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30823", }, { cve: "CVE-2021-30836", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30836", }, { cve: "CVE-2021-30884", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30884", }, { cve: "CVE-2021-30887", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30887", }, { cve: "CVE-2021-30888", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30888", }, { cve: "CVE-2021-30889", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30889", }, { cve: "CVE-2021-30890", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30890", }, { cve: "CVE-2021-30897", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30897", }, { cve: "CVE-2021-30934", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30934", }, { cve: "CVE-2021-30936", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30936", }, { cve: "CVE-2021-30951", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30951", }, { cve: "CVE-2021-30952", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30952", }, { cve: "CVE-2021-30953", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30953", }, { cve: "CVE-2021-30954", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30954", }, { cve: "CVE-2021-30984", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-30984", }, { cve: "CVE-2021-3448", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-3448", }, { cve: "CVE-2021-34558", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-34558", }, { cve: "CVE-2021-36221", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-36221", }, { cve: "CVE-2021-4115", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4115", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-4173", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4173", }, { cve: "CVE-2021-41771", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-41771", }, { cve: "CVE-2021-41772", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-41772", }, { cve: "CVE-2021-4187", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4187", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4217", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-4217", }, { cve: "CVE-2021-43519", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-43519", }, { cve: "CVE-2021-43566", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-43566", }, { cve: "CVE-2021-44142", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-44142", }, { cve: "CVE-2021-45444", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45444", }, { cve: "CVE-2021-45481", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45481", }, { cve: "CVE-2021-45482", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45482", }, { cve: "CVE-2021-45483", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45483", }, { cve: "CVE-2021-45960", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-45960", }, { cve: "CVE-2021-46143", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2021-46143", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2022-0156", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0156", }, { cve: "CVE-2022-0158", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0158", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0336", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0336", }, { cve: "CVE-2022-0391", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0391", }, { cve: "CVE-2022-0408", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0408", }, { cve: "CVE-2022-0413", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0413", }, { cve: "CVE-2022-0417", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0417", }, { cve: "CVE-2022-0443", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0443", }, { cve: "CVE-2022-0554", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0554", }, { cve: "CVE-2022-0566", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0566", }, { cve: "CVE-2022-0572", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0572", }, { cve: "CVE-2022-0629", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0629", }, { cve: "CVE-2022-0685", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0685", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0714", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0714", }, { cve: "CVE-2022-0729", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0729", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-1097", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1097", }, { cve: "CVE-2022-1196", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1196", }, { cve: "CVE-2022-1197", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1197", }, { cve: "CVE-2022-1271", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1271", }, { cve: "CVE-2022-1520", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1520", }, { cve: "CVE-2022-1834", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-1834", }, { cve: "CVE-2022-21245", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21245", }, { cve: "CVE-2022-21270", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21270", }, { cve: "CVE-2022-21291", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21291", }, { cve: "CVE-2022-21303", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21303", }, { cve: "CVE-2022-21304", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21304", }, { cve: "CVE-2022-21344", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21344", }, { cve: "CVE-2022-21349", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21349", }, { cve: "CVE-2022-21367", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21367", }, { cve: "CVE-2022-21426", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21426", }, { cve: "CVE-2022-21434", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21434", }, { cve: "CVE-2022-21443", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21443", }, { cve: "CVE-2022-21449", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21449", }, { cve: "CVE-2022-21476", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21476", }, { cve: "CVE-2022-21493", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21493", }, { cve: "CVE-2022-21494", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21494", }, { cve: "CVE-2022-21496", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21496", }, { cve: "CVE-2022-21514", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21514", }, { cve: "CVE-2022-21524", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21524", }, { cve: "CVE-2022-21533", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21533", }, { cve: "CVE-2022-21712", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21712", }, { cve: "CVE-2022-21716", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-21716", }, { cve: "CVE-2022-22589", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22589", }, { cve: "CVE-2022-22590", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22590", }, { cve: "CVE-2022-22592", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22592", }, { cve: "CVE-2022-22620", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22620", }, { cve: "CVE-2022-22719", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22719", }, { cve: "CVE-2022-22720", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22720", }, { cve: "CVE-2022-22721", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22721", }, { cve: "CVE-2022-22818", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22818", }, { cve: "CVE-2022-22822", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22822", }, { cve: "CVE-2022-22823", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22823", }, { cve: "CVE-2022-22824", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22824", }, { cve: "CVE-2022-22825", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22825", }, { cve: "CVE-2022-22826", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22826", }, { cve: "CVE-2022-22827", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-22827", }, { cve: "CVE-2022-23308", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23308", }, { cve: "CVE-2022-23772", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23772", }, { cve: "CVE-2022-23773", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23773", }, { cve: "CVE-2022-23806", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23806", }, { cve: "CVE-2022-23833", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23833", }, { cve: "CVE-2022-23852", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23852", }, { cve: "CVE-2022-23943", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23943", }, { cve: "CVE-2022-23990", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-23990", }, { cve: "CVE-2022-24130", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24130", }, { cve: "CVE-2022-24407", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24407", }, { cve: "CVE-2022-24675", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24675", }, { cve: "CVE-2022-24713", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24713", }, { cve: "CVE-2022-24801", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-24801", }, { cve: "CVE-2022-25235", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25235", }, { cve: "CVE-2022-25236", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25236", }, { cve: "CVE-2022-25313", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25313", }, { cve: "CVE-2022-25314", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25314", }, { cve: "CVE-2022-25315", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25315", }, { cve: "CVE-2022-25762", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-25762", }, { cve: "CVE-2022-26381", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26381", }, { cve: "CVE-2022-26383", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26383", }, { cve: "CVE-2022-26384", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26384", }, { cve: "CVE-2022-26386", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26386", }, { cve: "CVE-2022-26387", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26387", }, { cve: "CVE-2022-26485", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26485", }, { cve: "CVE-2022-26486", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-26486", }, { cve: "CVE-2022-28281", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28281", }, { cve: "CVE-2022-28282", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28282", }, { cve: "CVE-2022-28285", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28285", }, { cve: "CVE-2022-28286", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28286", }, { cve: "CVE-2022-28289", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28289", }, { cve: "CVE-2022-28327", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28327", }, { cve: "CVE-2022-28346", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28346", }, { cve: "CVE-2022-28347", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-28347", }, { cve: "CVE-2022-29824", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29824", }, { cve: "CVE-2022-29909", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29909", }, { cve: "CVE-2022-29911", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29911", }, { cve: "CVE-2022-29912", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29912", }, { cve: "CVE-2022-29913", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29913", }, { cve: "CVE-2022-29914", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29914", }, { cve: "CVE-2022-29916", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29916", }, { cve: "CVE-2022-29917", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-29917", }, { cve: "CVE-2022-31736", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31736", }, { cve: "CVE-2022-31737", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31737", }, { cve: "CVE-2022-31738", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31738", }, { cve: "CVE-2022-31739", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31739", }, { cve: "CVE-2022-3174", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-3174", }, { cve: "CVE-2022-31740", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31740", }, { cve: "CVE-2022-31741", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31741", }, { cve: "CVE-2022-31742", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31742", }, { cve: "CVE-2022-31747", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-31747", }, { cve: "CVE-2022-4187", notes: [ { category: "description", text: "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.", }, ], product_status: { known_affected: [ "T000872", "T015632", "T002977", ], }, release_date: "2022-09-07T22:00:00.000+00:00", title: "CVE-2022-4187", }, ], }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Dell ECS ist ein Objektspeichersystem.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-0794 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json", }, { category: "self", summary: "WID-SEC-2024-0794 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794", }, { category: "external", summary: "Dell Security Advisory DSA-2024-141 vom 2024-04-04", url: "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=", }, ], source_lang: "en-US", title: "Dell ECS: Mehrere Schwachstellen", tracking: { current_release_date: "2024-11-27T23:00:00.000+00:00", generator: { date: "2024-11-28T11:39:04.623+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2024-0794", initial_release_date: "2024-04-04T22:00:00.000+00:00", revision_history: [ { date: "2024-04-04T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-11-27T23:00:00.000+00:00", number: "2", summary: "Produktzuordnung überprüft", }, ], status: "final", version: "2", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<3.8.1.0", product: { name: "Dell ECS <3.8.1.0", product_id: "T033919", }, }, { category: "product_version", name: "3.8.1.0", product: { name: "Dell ECS 3.8.1.0", product_id: "T033919-fixed", product_identification_helper: { cpe: "cpe:/h:dell:ecs:3.8.1.0", }, }, }, ], category: "product_name", name: "ECS", }, ], category: "vendor", name: "Dell", }, ], }, vulnerabilities: [ { cve: "CVE-2018-18074", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2018-18074", }, { cve: "CVE-2020-10663", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10663", }, { cve: "CVE-2020-10672", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10672", }, { cve: "CVE-2020-10673", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10673", }, { cve: "CVE-2020-10735", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10735", }, { cve: "CVE-2020-10968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10968", }, { cve: "CVE-2020-10969", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-10969", }, { cve: "CVE-2020-11111", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11111", }, { cve: "CVE-2020-11112", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11112", }, { cve: "CVE-2020-11113", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11113", }, { cve: "CVE-2020-11612", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11612", }, { cve: "CVE-2020-11619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11619", }, { cve: "CVE-2020-11620", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11620", }, { cve: "CVE-2020-11979", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-11979", }, { cve: "CVE-2020-12762", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-12762", }, { cve: "CVE-2020-12825", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-12825", }, { cve: "CVE-2020-13956", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-13956", }, { cve: "CVE-2020-14060", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14060", }, { cve: "CVE-2020-14061", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14061", }, { cve: "CVE-2020-14062", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14062", }, { cve: "CVE-2020-14195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-14195", }, { cve: "CVE-2020-15250", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-15250", }, { cve: "CVE-2020-1945", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1945", }, { cve: "CVE-2020-1967", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1967", }, { cve: "CVE-2020-1971", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-1971", }, { cve: "CVE-2020-24616", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-24616", }, { cve: "CVE-2020-24750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-24750", }, { cve: "CVE-2020-25649", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-25649", }, { cve: "CVE-2020-25658", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-25658", }, { cve: "CVE-2020-26116", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26116", }, { cve: "CVE-2020-26137", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26137", }, { cve: "CVE-2020-26541", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-26541", }, { cve: "CVE-2020-27216", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27216", }, { cve: "CVE-2020-27218", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27218", }, { cve: "CVE-2020-27223", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-27223", }, { cve: "CVE-2020-28366", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-28366", }, { cve: "CVE-2020-28493", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-28493", }, { cve: "CVE-2020-29509", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29509", }, { cve: "CVE-2020-29511", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29511", }, { cve: "CVE-2020-29582", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29582", }, { cve: "CVE-2020-29651", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-29651", }, { cve: "CVE-2020-35490", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35490", }, { cve: "CVE-2020-35491", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35491", }, { cve: "CVE-2020-35728", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-35728", }, { cve: "CVE-2020-36179", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36179", }, { cve: "CVE-2020-36180", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36180", }, { cve: "CVE-2020-36181", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36181", }, { cve: "CVE-2020-36182", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36182", }, { cve: "CVE-2020-36183", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36183", }, { cve: "CVE-2020-36184", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36184", }, { cve: "CVE-2020-36185", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36185", }, { cve: "CVE-2020-36186", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36186", }, { cve: "CVE-2020-36187", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36187", }, { cve: "CVE-2020-36188", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36188", }, { cve: "CVE-2020-36189", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36189", }, { cve: "CVE-2020-36516", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36516", }, { cve: "CVE-2020-36518", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36518", }, { cve: "CVE-2020-36557", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36557", }, { cve: "CVE-2020-36558", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36558", }, { cve: "CVE-2020-36691", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-36691", }, { cve: "CVE-2020-7238", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-7238", }, { cve: "CVE-2020-8840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8840", }, { cve: "CVE-2020-8908", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8908", }, { cve: "CVE-2020-8911", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8911", }, { cve: "CVE-2020-8912", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-8912", }, { cve: "CVE-2020-9488", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9488", }, { cve: "CVE-2020-9493", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9493", }, { cve: "CVE-2020-9546", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9546", }, { cve: "CVE-2020-9547", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9547", }, { cve: "CVE-2020-9548", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2020-9548", }, { cve: "CVE-2021-20190", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-20190", }, { cve: "CVE-2021-20323", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-20323", }, { cve: "CVE-2021-21290", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21290", }, { cve: "CVE-2021-21295", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21295", }, { cve: "CVE-2021-21409", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-21409", }, { cve: "CVE-2021-23840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-23840", }, { cve: "CVE-2021-23841", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-23841", }, { cve: "CVE-2021-2471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-2471", }, { cve: "CVE-2021-25642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-25642", }, { cve: "CVE-2021-26341", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-26341", }, { cve: "CVE-2021-27918", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-27918", }, { cve: "CVE-2021-28153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28153", }, { cve: "CVE-2021-28165", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28165", }, { cve: "CVE-2021-28169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28169", }, { cve: "CVE-2021-28861", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-28861", }, { cve: "CVE-2021-29425", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-29425", }, { cve: "CVE-2021-30560", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-30560", }, { cve: "CVE-2021-3114", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3114", }, { cve: "CVE-2021-33036", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33036", }, { cve: "CVE-2021-33194", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33194", }, { cve: "CVE-2021-33195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33195", }, { cve: "CVE-2021-33196", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33196", }, { cve: "CVE-2021-33197", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33197", }, { cve: "CVE-2021-33503", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33503", }, { cve: "CVE-2021-33655", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33655", }, { cve: "CVE-2021-33656", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-33656", }, { cve: "CVE-2021-3424", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3424", }, { cve: "CVE-2021-34428", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-34428", }, { cve: "CVE-2021-3449", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3449", }, { cve: "CVE-2021-3450", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3450", }, { cve: "CVE-2021-3530", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3530", }, { cve: "CVE-2021-36221", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36221", }, { cve: "CVE-2021-36373", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36373", }, { cve: "CVE-2021-36374", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36374", }, { cve: "CVE-2021-3648", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3648", }, { cve: "CVE-2021-36690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-36690", }, { cve: "CVE-2021-3711", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3711", }, { cve: "CVE-2021-3712", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3712", }, { cve: "CVE-2021-37136", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37136", }, { cve: "CVE-2021-37137", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37137", }, { cve: "CVE-2021-37404", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37404", }, { cve: "CVE-2021-37533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-37533", }, { cve: "CVE-2021-3754", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3754", }, { cve: "CVE-2021-3778", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3778", }, { cve: "CVE-2021-3796", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3796", }, { cve: "CVE-2021-3826", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3826", }, { cve: "CVE-2021-3827", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3827", }, { cve: "CVE-2021-38297", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-38297", }, { cve: "CVE-2021-3872", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3872", }, { cve: "CVE-2021-3875", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3875", }, { cve: "CVE-2021-3903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3903", }, { cve: "CVE-2021-3923", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3923", }, { cve: "CVE-2021-3927", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3927", }, { cve: "CVE-2021-3928", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3928", }, { cve: "CVE-2021-3968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3968", }, { cve: "CVE-2021-3973", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3973", }, { cve: "CVE-2021-3974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3974", }, { cve: "CVE-2021-3984", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-3984", }, { cve: "CVE-2021-4019", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4019", }, { cve: "CVE-2021-4037", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4037", }, { cve: "CVE-2021-4069", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4069", }, { cve: "CVE-2021-4104", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4104", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2021-4157", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4157", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-41771", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-41771", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4203", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-4203", }, { cve: "CVE-2021-42567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-42567", }, { cve: "CVE-2021-43797", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-43797", }, { cve: "CVE-2021-44531", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44531", }, { cve: "CVE-2021-44532", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44532", }, { cve: "CVE-2021-44533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44533", }, { cve: "CVE-2021-44716", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44716", }, { cve: "CVE-2021-44878", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-44878", }, { cve: "CVE-2021-45078", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-45078", }, { cve: "CVE-2021-46195", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46195", }, { cve: "CVE-2021-46828", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46828", }, { cve: "CVE-2021-46848", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2021-46848", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2022-0213", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0213", }, { cve: "CVE-2022-0225", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0225", }, { cve: "CVE-2022-0261", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0261", }, { cve: "CVE-2022-0318", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0318", }, { cve: "CVE-2022-0319", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0319", }, { cve: "CVE-2022-0351", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0351", }, { cve: "CVE-2022-0359", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0359", }, { cve: "CVE-2022-0361", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0361", }, { cve: "CVE-2022-0392", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0392", }, { cve: "CVE-2022-0407", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0407", }, { cve: "CVE-2022-0413", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0413", }, { cve: "CVE-2022-0561", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0561", }, { cve: "CVE-2022-0696", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0696", }, { cve: "CVE-2022-0778", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-0778", }, { cve: "CVE-2022-1184", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1184", }, { cve: "CVE-2022-1245", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1245", }, { cve: "CVE-2022-1271", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1271", }, { cve: "CVE-2022-1292", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1292", }, { cve: "CVE-2022-1381", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1381", }, { cve: "CVE-2022-1420", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1420", }, { cve: "CVE-2022-1462", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1462", }, { cve: "CVE-2022-1466", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1466", }, { cve: "CVE-2022-1471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1471", }, { cve: "CVE-2022-1586", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1586", }, { cve: "CVE-2022-1587", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1587", }, { cve: "CVE-2022-1616", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1616", }, { cve: "CVE-2022-1619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1619", }, { cve: "CVE-2022-1620", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1620", }, { cve: "CVE-2022-1679", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1679", }, { cve: "CVE-2022-1705", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1705", }, { cve: "CVE-2022-1720", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1720", }, { cve: "CVE-2022-1729", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1729", }, { cve: "CVE-2022-1733", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1733", }, { cve: "CVE-2022-1735", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1735", }, { cve: "CVE-2022-1771", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1771", }, { cve: "CVE-2022-1785", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1785", }, { cve: "CVE-2022-1796", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1796", }, { cve: "CVE-2022-1851", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1851", }, { cve: "CVE-2022-1897", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1897", }, { cve: "CVE-2022-1898", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1898", }, { cve: "CVE-2022-1927", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1927", }, { cve: "CVE-2022-1962", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1962", }, { cve: "CVE-2022-1968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1968", }, { cve: "CVE-2022-1974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1974", }, { cve: "CVE-2022-1975", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-1975", }, { cve: "CVE-2022-20132", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20132", }, { cve: "CVE-2022-20141", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20141", }, { cve: "CVE-2022-20154", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20154", }, { cve: "CVE-2022-20166", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20166", }, { cve: "CVE-2022-20368", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20368", }, { cve: "CVE-2022-20369", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20369", }, { cve: "CVE-2022-2047", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2047", }, { cve: "CVE-2022-2048", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2048", }, { cve: "CVE-2022-20567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-20567", }, { cve: "CVE-2022-2068", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2068", }, { cve: "CVE-2022-2097", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2097", }, { cve: "CVE-2022-21216", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21216", }, { cve: "CVE-2022-21233", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21233", }, { cve: "CVE-2022-2124", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2124", }, { cve: "CVE-2022-2125", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2125", }, { cve: "CVE-2022-2126", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2126", }, { cve: "CVE-2022-2129", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2129", }, { cve: "CVE-2022-21363", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21363", }, { cve: "CVE-2022-21385", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21385", }, { cve: "CVE-2022-21499", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21499", }, { cve: "CVE-2022-2153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2153", }, { cve: "CVE-2022-21540", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21540", }, { cve: "CVE-2022-21541", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21541", }, { cve: "CVE-2022-21549", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21549", }, { cve: "CVE-2022-21618", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21618", }, { cve: "CVE-2022-21619", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21619", }, { cve: "CVE-2022-21624", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21624", }, { cve: "CVE-2022-21626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21626", }, { cve: "CVE-2022-21628", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21628", }, { cve: "CVE-2022-21702", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-21702", }, { cve: "CVE-2022-2175", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2175", }, { cve: "CVE-2022-2182", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2182", }, { cve: "CVE-2022-2183", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2183", }, { cve: "CVE-2022-2206", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2206", }, { cve: "CVE-2022-2207", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2207", }, { cve: "CVE-2022-2208", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2208", }, { cve: "CVE-2022-2210", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2210", }, { cve: "CVE-2022-2231", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2231", }, { cve: "CVE-2022-2256", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2256", }, { cve: "CVE-2022-2257", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2257", }, { cve: "CVE-2022-2264", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2264", }, { cve: "CVE-2022-2284", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2284", }, { cve: "CVE-2022-2285", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2285", }, { cve: "CVE-2022-2286", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2286", }, { cve: "CVE-2022-2287", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2287", }, { cve: "CVE-2022-22976", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-22976", }, { cve: "CVE-2022-22978", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-22978", }, { cve: "CVE-2022-2304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2304", }, { cve: "CVE-2022-2318", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2318", }, { cve: "CVE-2022-23302", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23302", }, { cve: "CVE-2022-23305", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23305", }, { cve: "CVE-2022-23307", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23307", }, { cve: "CVE-2022-2343", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2343", }, { cve: "CVE-2022-2344", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2344", }, { cve: "CVE-2022-2345", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2345", }, { cve: "CVE-2022-23471", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23471", }, { cve: "CVE-2022-23521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23521", }, { cve: "CVE-2022-23772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23772", }, { cve: "CVE-2022-23773", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-23773", }, { cve: "CVE-2022-24302", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24302", }, { cve: "CVE-2022-24329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24329", }, { cve: "CVE-2022-24823", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24823", }, { cve: "CVE-2022-24903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-24903", }, { cve: "CVE-2022-2503", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2503", }, { cve: "CVE-2022-25147", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25147", }, { cve: "CVE-2022-25168", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25168", }, { cve: "CVE-2022-2519", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2519", }, { cve: "CVE-2022-2520", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2520", }, { cve: "CVE-2022-2521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2521", }, { cve: "CVE-2022-2522", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2522", }, { cve: "CVE-2022-25647", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25647", }, { cve: "CVE-2022-2571", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2571", }, { cve: "CVE-2022-2580", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2580", }, { cve: "CVE-2022-2581", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2581", }, { cve: "CVE-2022-25857", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-25857", }, { cve: "CVE-2022-2588", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2588", }, { cve: "CVE-2022-2598", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2598", }, { cve: "CVE-2022-26148", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26148", }, { cve: "CVE-2022-26365", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26365", }, { cve: "CVE-2022-26373", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26373", }, { cve: "CVE-2022-2639", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2639", }, { cve: "CVE-2022-26612", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-26612", }, { cve: "CVE-2022-2663", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2663", }, { cve: "CVE-2022-27781", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27781", }, { cve: "CVE-2022-27782", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27782", }, { cve: "CVE-2022-27943", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-27943", }, { cve: "CVE-2022-2795", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2795", }, { cve: "CVE-2022-28131", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28131", }, { cve: "CVE-2022-2816", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2816", }, { cve: "CVE-2022-2817", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2817", }, { cve: "CVE-2022-2819", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2819", }, { cve: "CVE-2022-28327", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28327", }, { cve: "CVE-2022-2845", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2845", }, { cve: "CVE-2022-2849", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2849", }, { cve: "CVE-2022-2862", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2862", }, { cve: "CVE-2022-2867", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2867", }, { cve: "CVE-2022-2868", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2868", }, { cve: "CVE-2022-2869", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2869", }, { cve: "CVE-2022-28693", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28693", }, { cve: "CVE-2022-2874", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2874", }, { cve: "CVE-2022-28748", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-28748", }, { cve: "CVE-2022-2880", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2880", }, { cve: "CVE-2022-2889", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2889", }, { cve: "CVE-2022-29162", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29162", }, { cve: "CVE-2022-29187", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29187", }, { cve: "CVE-2022-2923", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2923", }, { cve: "CVE-2022-2946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2946", }, { cve: "CVE-2022-29526", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29526", }, { cve: "CVE-2022-29583", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29583", }, { cve: "CVE-2022-2964", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2964", }, { cve: "CVE-2022-2977", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2977", }, { cve: "CVE-2022-2980", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2980", }, { cve: "CVE-2022-2982", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2982", }, { cve: "CVE-2022-29900", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29900", }, { cve: "CVE-2022-29901", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-29901", }, { cve: "CVE-2022-2991", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-2991", }, { cve: "CVE-2022-3016", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3016", }, { cve: "CVE-2022-3028", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3028", }, { cve: "CVE-2022-3037", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3037", }, { cve: "CVE-2022-30580", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30580", }, { cve: "CVE-2022-30630", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30630", }, { cve: "CVE-2022-30631", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30631", }, { cve: "CVE-2022-30632", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30632", }, { cve: "CVE-2022-30633", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-30633", }, { cve: "CVE-2022-3099", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3099", }, { cve: "CVE-2022-31030", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31030", }, { cve: "CVE-2022-31159", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31159", }, { cve: "CVE-2022-3134", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3134", }, { cve: "CVE-2022-3153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3153", }, { cve: "CVE-2022-3169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3169", }, { cve: "CVE-2022-31690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-31690", }, { cve: "CVE-2022-32148", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32148", }, { cve: "CVE-2022-32149", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32149", }, { cve: "CVE-2022-32206", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32206", }, { cve: "CVE-2022-32208", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32208", }, { cve: "CVE-2022-32221", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-32221", }, { cve: "CVE-2022-3234", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3234", }, { cve: "CVE-2022-3235", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3235", }, { cve: "CVE-2022-3239", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3239", }, { cve: "CVE-2022-3278", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3278", }, { cve: "CVE-2022-3296", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3296", }, { cve: "CVE-2022-3297", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3297", }, { cve: "CVE-2022-33196", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33196", }, { cve: "CVE-2022-3324", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3324", }, { cve: "CVE-2022-3352", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3352", }, { cve: "CVE-2022-33740", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33740", }, { cve: "CVE-2022-33741", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33741", }, { cve: "CVE-2022-33742", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33742", }, { cve: "CVE-2022-33972", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33972", }, { cve: "CVE-2022-33981", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-33981", }, { cve: "CVE-2022-34169", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34169", }, { cve: "CVE-2022-3424", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3424", }, { cve: "CVE-2022-34266", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34266", }, { cve: "CVE-2022-34526", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34526", }, { cve: "CVE-2022-34903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-34903", }, { cve: "CVE-2022-3491", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3491", }, { cve: "CVE-2022-3515", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3515", }, { cve: "CVE-2022-3520", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3520", }, { cve: "CVE-2022-3521", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3521", }, { cve: "CVE-2022-3524", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3524", }, { cve: "CVE-2022-35252", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-35252", }, { cve: "CVE-2022-3542", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3542", }, { cve: "CVE-2022-3545", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3545", }, { cve: "CVE-2022-3564", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3564", }, { cve: "CVE-2022-3565", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3565", }, { cve: "CVE-2022-3566", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3566", }, { cve: "CVE-2022-3567", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3567", }, { cve: "CVE-2022-35737", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-35737", }, { cve: "CVE-2022-3586", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3586", }, { cve: "CVE-2022-3591", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3591", }, { cve: "CVE-2022-3594", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3594", }, { cve: "CVE-2022-3597", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3597", }, { cve: "CVE-2022-3599", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3599", }, { cve: "CVE-2022-36109", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36109", }, { cve: "CVE-2022-3621", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3621", }, { cve: "CVE-2022-3626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3626", }, { cve: "CVE-2022-3627", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3627", }, { cve: "CVE-2022-3628", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3628", }, { cve: "CVE-2022-36280", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36280", }, { cve: "CVE-2022-3629", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3629", }, { cve: "CVE-2022-3635", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3635", }, { cve: "CVE-2022-3643", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3643", }, { cve: "CVE-2022-36437", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36437", }, { cve: "CVE-2022-3646", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3646", }, { cve: "CVE-2022-3649", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3649", }, { cve: "CVE-2022-36760", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36760", }, { cve: "CVE-2022-36879", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36879", }, { cve: "CVE-2022-36946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-36946", }, { cve: "CVE-2022-3705", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3705", }, { cve: "CVE-2022-37434", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37434", }, { cve: "CVE-2022-37436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37436", }, { cve: "CVE-2022-37865", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37865", }, { cve: "CVE-2022-37866", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-37866", }, { cve: "CVE-2022-38090", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38090", }, { cve: "CVE-2022-38096", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38096", }, { cve: "CVE-2022-38126", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38126", }, { cve: "CVE-2022-38127", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38127", }, { cve: "CVE-2022-38177", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38177", }, { cve: "CVE-2022-38178", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38178", }, { cve: "CVE-2022-3821", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3821", }, { cve: "CVE-2022-38533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38533", }, { cve: "CVE-2022-38749", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38749", }, { cve: "CVE-2022-38750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38750", }, { cve: "CVE-2022-38751", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38751", }, { cve: "CVE-2022-38752", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-38752", }, { cve: "CVE-2022-39028", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39028", }, { cve: "CVE-2022-3903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3903", }, { cve: "CVE-2022-39188", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39188", }, { cve: "CVE-2022-39399", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-39399", }, { cve: "CVE-2022-3970", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-3970", }, { cve: "CVE-2022-40149", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40149", }, { cve: "CVE-2022-40150", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40150", }, { cve: "CVE-2022-40151", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40151", }, { cve: "CVE-2022-40152", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40152", }, { cve: "CVE-2022-40153", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40153", }, { cve: "CVE-2022-40303", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40303", }, { cve: "CVE-2022-40304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40304", }, { cve: "CVE-2022-40307", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40307", }, { cve: "CVE-2022-40674", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40674", }, { cve: "CVE-2022-40768", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40768", }, { cve: "CVE-2022-40899", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-40899", }, { cve: "CVE-2022-4095", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4095", }, { cve: "CVE-2022-41218", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41218", }, { cve: "CVE-2022-4129", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4129", }, { cve: "CVE-2022-4141", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4141", }, { cve: "CVE-2022-41717", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41717", }, { cve: "CVE-2022-41721", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41721", }, { cve: "CVE-2022-41848", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41848", }, { cve: "CVE-2022-41850", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41850", }, { cve: "CVE-2022-41854", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41854", }, { cve: "CVE-2022-41858", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41858", }, { cve: "CVE-2022-41881", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41881", }, { cve: "CVE-2022-41903", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41903", }, { cve: "CVE-2022-41915", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41915", }, { cve: "CVE-2022-41966", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41966", }, { cve: "CVE-2022-41974", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-41974", }, { cve: "CVE-2022-42003", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42003", }, { cve: "CVE-2022-42004", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42004", }, { cve: "CVE-2022-42010", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42010", }, { cve: "CVE-2022-42011", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42011", }, { cve: "CVE-2022-42012", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42012", }, { cve: "CVE-2022-42328", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42328", }, { cve: "CVE-2022-42329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42329", }, { cve: "CVE-2022-42703", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42703", }, { cve: "CVE-2022-42889", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42889", }, { cve: "CVE-2022-42895", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42895", }, { cve: "CVE-2022-42896", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42896", }, { cve: "CVE-2022-42898", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42898", }, { cve: "CVE-2022-4292", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4292", }, { cve: "CVE-2022-4293", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4293", }, { cve: "CVE-2022-42969", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-42969", }, { cve: "CVE-2022-4304", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4304", }, { cve: "CVE-2022-43552", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43552", }, { cve: "CVE-2022-43680", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43680", }, { cve: "CVE-2022-43750", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43750", }, { cve: "CVE-2022-4378", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4378", }, { cve: "CVE-2022-43945", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43945", }, { cve: "CVE-2022-43995", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-43995", }, { cve: "CVE-2022-4415", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4415", }, { cve: "CVE-2022-4450", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4450", }, { cve: "CVE-2022-44638", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-44638", }, { cve: "CVE-2022-45061", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45061", }, { cve: "CVE-2022-45688", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45688", }, { cve: "CVE-2022-45884", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45884", }, { cve: "CVE-2022-45885", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45885", }, { cve: "CVE-2022-45886", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45886", }, { cve: "CVE-2022-45887", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45887", }, { cve: "CVE-2022-45919", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45919", }, { cve: "CVE-2022-45934", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45934", }, { cve: "CVE-2022-45939", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-45939", }, { cve: "CVE-2022-4662", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-4662", }, { cve: "CVE-2022-46751", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-46751", }, { cve: "CVE-2022-46908", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-46908", }, { cve: "CVE-2022-47629", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-47629", }, { cve: "CVE-2022-47929", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-47929", }, { cve: "CVE-2022-48281", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48281", }, { cve: "CVE-2022-48337", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48337", }, { cve: "CVE-2022-48339", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2022-48339", }, { cve: "CVE-2023-0045", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0045", }, { cve: "CVE-2023-0049", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0049", }, { cve: "CVE-2023-0051", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0051", }, { cve: "CVE-2023-0054", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0054", }, { cve: "CVE-2023-0215", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0215", }, { cve: "CVE-2023-0286", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0286", }, { cve: "CVE-2023-0288", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0288", }, { cve: "CVE-2023-0433", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0433", }, { cve: "CVE-2023-0464", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0464", }, { cve: "CVE-2023-0465", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0465", }, { cve: "CVE-2023-0466", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0466", }, { cve: "CVE-2023-0512", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0512", }, { cve: "CVE-2023-0590", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0590", }, { cve: "CVE-2023-0597", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0597", }, { cve: "CVE-2023-0833", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-0833", }, { cve: "CVE-2023-1076", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1076", }, { cve: "CVE-2023-1095", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1095", }, { cve: "CVE-2023-1118", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1118", }, { cve: "CVE-2023-1127", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1127", }, { cve: "CVE-2023-1170", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1170", }, { cve: "CVE-2023-1175", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1175", }, { cve: "CVE-2023-1370", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1370", }, { cve: "CVE-2023-1380", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1380", }, { cve: "CVE-2023-1390", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1390", }, { cve: "CVE-2023-1436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1436", }, { cve: "CVE-2023-1513", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1513", }, { cve: "CVE-2023-1611", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1611", }, { cve: "CVE-2023-1670", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1670", }, { cve: "CVE-2023-1855", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1855", }, { cve: "CVE-2023-1989", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1989", }, { cve: "CVE-2023-1990", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1990", }, { cve: "CVE-2023-1998", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-1998", }, { cve: "CVE-2023-20862", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-20862", }, { cve: "CVE-2023-2124", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2124", }, { cve: "CVE-2023-2162", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2162", }, { cve: "CVE-2023-2176", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2176", }, { cve: "CVE-2023-21830", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21830", }, { cve: "CVE-2023-21835", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21835", }, { cve: "CVE-2023-21843", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21843", }, { cve: "CVE-2023-21930", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21930", }, { cve: "CVE-2023-21937", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21937", }, { cve: "CVE-2023-21938", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21938", }, { cve: "CVE-2023-21939", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21939", }, { cve: "CVE-2023-2194", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2194", }, { cve: "CVE-2023-21954", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21954", }, { cve: "CVE-2023-21967", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21967", }, { cve: "CVE-2023-21968", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-21968", }, { cve: "CVE-2023-22490", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-22490", }, { cve: "CVE-2023-2253", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2253", }, { cve: "CVE-2023-22809", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-22809", }, { cve: "CVE-2023-23454", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23454", }, { cve: "CVE-2023-23455", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23455", }, { cve: "CVE-2023-23559", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23559", }, { cve: "CVE-2023-23916", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23916", }, { cve: "CVE-2023-23946", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-23946", }, { cve: "CVE-2023-24329", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24329", }, { cve: "CVE-2023-24532", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24532", }, { cve: "CVE-2023-24534", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24534", }, { cve: "CVE-2023-2483", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2483", }, { cve: "CVE-2023-24998", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-24998", }, { cve: "CVE-2023-2513", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2513", }, { cve: "CVE-2023-25193", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25193", }, { cve: "CVE-2023-25652", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25652", }, { cve: "CVE-2023-25690", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25690", }, { cve: "CVE-2023-25809", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25809", }, { cve: "CVE-2023-25815", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-25815", }, { cve: "CVE-2023-26048", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26048", }, { cve: "CVE-2023-26049", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26049", }, { cve: "CVE-2023-2650", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2650", }, { cve: "CVE-2023-26545", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26545", }, { cve: "CVE-2023-26604", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-26604", }, { cve: "CVE-2023-27533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27533", }, { cve: "CVE-2023-27534", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27534", }, { cve: "CVE-2023-27535", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27535", }, { cve: "CVE-2023-27536", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27536", }, { cve: "CVE-2023-27538", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27538", }, { cve: "CVE-2023-27561", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-27561", }, { cve: "CVE-2023-2828", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2828", }, { cve: "CVE-2023-28320", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28320", }, { cve: "CVE-2023-28321", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28321", }, { cve: "CVE-2023-28322", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28322", }, { cve: "CVE-2023-28328", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28328", }, { cve: "CVE-2023-28464", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28464", }, { cve: "CVE-2023-28486", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28486", }, { cve: "CVE-2023-28487", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28487", }, { cve: "CVE-2023-28642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28642", }, { cve: "CVE-2023-28772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28772", }, { cve: "CVE-2023-28840", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28840", }, { cve: "CVE-2023-28841", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28841", }, { cve: "CVE-2023-28842", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-28842", }, { cve: "CVE-2023-29007", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29007", }, { cve: "CVE-2023-29383", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29383", }, { cve: "CVE-2023-29402", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29402", }, { cve: "CVE-2023-29406", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29406", }, { cve: "CVE-2023-29409", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-29409", }, { cve: "CVE-2023-2976", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-2976", }, { cve: "CVE-2023-30630", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-30630", }, { cve: "CVE-2023-30772", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-30772", }, { cve: "CVE-2023-31084", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31084", }, { cve: "CVE-2023-3138", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-3138", }, { cve: "CVE-2023-31436", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31436", }, { cve: "CVE-2023-31484", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-31484", }, { cve: "CVE-2023-32269", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-32269", }, { cve: "CVE-2023-32697", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-32697", }, { cve: "CVE-2023-33264", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-33264", }, { cve: "CVE-2023-34034", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34034", }, { cve: "CVE-2023-34035", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34035", }, { cve: "CVE-2023-34453", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34453", }, { cve: "CVE-2023-34454", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34454", }, { cve: "CVE-2023-34455", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34455", }, { cve: "CVE-2023-34462", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-34462", }, { cve: "CVE-2023-35116", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-35116", }, { cve: "CVE-2023-3635", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-3635", }, { cve: "CVE-2023-36479", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-36479", }, { cve: "CVE-2023-39533", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-39533", }, { cve: "CVE-2023-40167", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-40167", }, { cve: "CVE-2023-40217", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-40217", }, { cve: "CVE-2023-41105", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-41105", }, { cve: "CVE-2023-41900", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-41900", }, { cve: "CVE-2023-43642", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-43642", }, { cve: "CVE-2023-43804", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-43804", }, { cve: "CVE-2023-44487", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-44487", }, { cve: "CVE-2023-45803", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2023-45803", }, { cve: "CVE-2024-21626", notes: [ { category: "description", text: "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.", }, ], product_status: { known_affected: [ "T033919", ], }, release_date: "2024-04-04T22:00:00.000+00:00", title: "CVE-2024-21626", }, ], }
wid-sec-w-2022-1056
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, , um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen.", title: "Angriff", }, { category: "general", text: "- MacOS X", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1056 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1056.json", }, { category: "self", summary: "WID-SEC-2022-1056 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1056", }, { category: "external", summary: "Apple Security Advisory vom 2022-03-14", url: "https://support.apple.com/en-us/HT213183", }, { category: "external", summary: "Apple Security Advisory vom 2022-03-14", url: "https://support.apple.com/en-us/HT213184", }, { category: "external", summary: "Apple Security Advisory vom 2022-03-14", url: "https://support.apple.com/en-us/HT213185", }, { category: "external", summary: "PoC von TrendMicro vom 2022-03-14", url: "https://www.trendmicro.com/en_us/research/22/d/macos-suhelper-root-privilege-escalation-vulnerability-a-deep-di.html", }, ], source_lang: "en-US", title: "Apple macOS: Mehrere Schwachstellen", tracking: { current_release_date: "2023-06-21T22:00:00.000+00:00", generator: { date: "2024-08-15T17:33:26.744+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-1056", initial_release_date: "2022-03-14T23:00:00.000+00:00", revision_history: [ { date: "2022-03-14T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-04-05T22:00:00.000+00:00", number: "2", summary: "Exploit aufgenommen", }, { date: "2022-08-16T22:00:00.000+00:00", number: "3", summary: "CVE ergänzt", }, { date: "2023-06-21T22:00:00.000+00:00", number: "4", summary: "CVE ergänzt", }, ], status: "final", version: "4", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Apple macOS Monterey < 12.3", product: { name: "Apple macOS Monterey < 12.3", product_id: "T022329", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:monterey__12.3", }, }, }, { category: "product_name", name: "Apple macOS Big Sur < 11.6.5", product: { name: "Apple macOS Big Sur < 11.6.5", product_id: "T022330", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:big_sur__11.6.5", }, }, }, { category: "product_name", name: "Apple macOS Catalina", product: { name: "Apple macOS Catalina", product_id: "T022331", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:catalina", }, }, }, ], category: "product_name", name: "macOS", }, ], category: "vendor", name: "Apple", }, ], }, vulnerabilities: [ { cve: "CVE-2022-46706", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-46706", }, { cve: "CVE-2022-26690", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-26690", }, { cve: "CVE-2022-26688", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-26688", }, { cve: "CVE-2022-22672", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22672", }, { cve: "CVE-2022-22669", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22669", }, { cve: "CVE-2022-22668", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22668", }, { cve: "CVE-2022-22665", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22665", }, { cve: "CVE-2022-22664", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22664", }, { cve: "CVE-2022-22662", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22662", }, { cve: "CVE-2022-22661", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22661", }, { cve: "CVE-2022-22660", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22660", }, { cve: "CVE-2022-22657", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22657", }, { cve: "CVE-2022-22656", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22656", }, { cve: "CVE-2022-22655", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22655", }, { cve: "CVE-2022-22651", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22651", }, { cve: "CVE-2022-22650", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22650", }, { cve: "CVE-2022-22648", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22648", }, { cve: "CVE-2022-22647", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22647", }, { cve: "CVE-2022-22644", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22644", }, { cve: "CVE-2022-22643", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22643", }, { cve: "CVE-2022-22641", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22641", }, { cve: "CVE-2022-22640", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22640", }, { cve: "CVE-2022-22639", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22639", }, { cve: "CVE-2022-22638", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22638", }, { cve: "CVE-2022-22637", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22637", }, { cve: "CVE-2022-22633", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22633", }, { cve: "CVE-2022-22632", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22632", }, { cve: "CVE-2022-22631", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22631", }, { cve: "CVE-2022-22630", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22630", }, { cve: "CVE-2022-22629", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22629", }, { cve: "CVE-2022-22628", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22628", }, { cve: "CVE-2022-22627", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22627", }, { cve: "CVE-2022-22626", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22626", }, { cve: "CVE-2022-22625", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22625", }, { cve: "CVE-2022-22624", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22624", }, { cve: "CVE-2022-22623", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22623", }, { cve: "CVE-2022-22621", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22621", }, { cve: "CVE-2022-22617", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22617", }, { cve: "CVE-2022-22616", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22616", }, { cve: "CVE-2022-22615", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22615", }, { cve: "CVE-2022-22614", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22614", }, { cve: "CVE-2022-22613", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22613", }, { cve: "CVE-2022-22612", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22612", }, { cve: "CVE-2022-22611", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22611", }, { cve: "CVE-2022-22610", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22610", }, { cve: "CVE-2022-22609", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22609", }, { cve: "CVE-2022-22600", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22600", }, { cve: "CVE-2022-22599", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22599", }, { cve: "CVE-2022-22597", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22597", }, { cve: "CVE-2022-22582", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22582", }, { cve: "CVE-2022-0158", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-0158", }, { cve: "CVE-2022-0156", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-0156", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2021-46059", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-46059", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4187", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-4187", }, { cve: "CVE-2021-4173", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-4173", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2021-36976", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-36976", }, { cve: "CVE-2021-30918", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-30918", }, { cve: "CVE-2021-22947", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-22947", }, { cve: "CVE-2021-22946", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-22946", }, { cve: "CVE-2021-22945", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-22945", }, ], }
WID-SEC-W-2022-0353
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "mittel", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in vim ausnutzen,um einen Denial of Service zu verursachen, Sicherheitsmechanismen zu umgehen, den Speicher zu manipulieren oder potentiell Code auszuführen.", title: "Angriff", }, { category: "general", text: "- UNIX\n- Linux\n- Windows\n- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-0353 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0353.json", }, { category: "self", summary: "WID-SEC-2022-0353 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0353", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:4619-1 vom 2022-12-27", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html", }, { category: "external", summary: "NIST Vulnerability Database vom 2021-12-19", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-4136", }, { category: "external", summary: "PoC auf huntr.dev", url: "https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938/", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1557 vom 2022-01-20", url: "https://alas.aws.amazon.com/ALAS-2022-1557.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-1743 vom 2022-01-27", url: "https://alas.aws.amazon.com/AL2/ALAS-2022-1743.html", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2022-014 vom 2022-01-27", url: "https://alas.aws.amazon.com/AL2022/ALAS-2022-014.html", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2022:2102-1 vom 2022-06-16", url: "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html", }, { category: "external", summary: "Gentoo Linux Security Advisory GLSA-202208-32 vom 2022-08-23", url: "https://security.gentoo.org/glsa/202208-32", }, ], source_lang: "en-US", title: "vim: Schwachstelle ermöglicht Codeausführung", tracking: { current_release_date: "2022-12-26T23:00:00.000+00:00", generator: { date: "2024-08-15T17:28:37.828+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-0353", initial_release_date: "2021-12-19T23:00:00.000+00:00", revision_history: [ { date: "2021-12-19T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-01-05T23:00:00.000+00:00", number: "2", summary: "Referenz(en) aufgenommen: FEDORA-2022-A3D70B50F0, FEDORA-2022-B5DE00C0F2", }, { date: "2022-01-12T23:00:00.000+00:00", number: "3", summary: "Referenz(en) aufgenommen: FEDORA-2022-48B86D586F", }, { date: "2022-01-19T23:00:00.000+00:00", number: "4", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-01-27T23:00:00.000+00:00", number: "5", summary: "Neue Updates von Amazon aufgenommen", }, { date: "2022-06-16T22:00:00.000+00:00", number: "6", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2022-08-22T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Gentoo aufgenommen", }, { date: "2022-12-26T23:00:00.000+00:00", number: "8", summary: "Neue Updates von SUSE aufgenommen", }, ], status: "final", version: "8", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Gentoo Linux", product: { name: "Gentoo Linux", product_id: "T012167", product_identification_helper: { cpe: "cpe:/o:gentoo:linux:-", }, }, }, ], category: "vendor", name: "Gentoo", }, { branches: [ { category: "product_name", name: "Open Source vim < 8.2.3847", product: { name: "Open Source vim < 8.2.3847", product_id: "T021391", product_identification_helper: { cpe: "cpe:/a:vim:vim:8.2.3847", }, }, }, ], category: "vendor", name: "Open Source", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, ], }, vulnerabilities: [ { cve: "CVE-2021-4136", notes: [ { category: "description", text: "Es existiert eine Schwachstelle in vim. Diese besteht aufgrund eines Heap-basierten Pufferüberlaufs. Ein Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen, Sicherheitsmechanismen zu umgehen, den Speicher zu manipulieren oder potentiell Code auszuführen. Zur erfolgreichen Ausnutzung muss eine speziell gestaltete Datei mit bestimmen Kommandozeilenparametern in vim geöffnet werden.", }, ], product_status: { known_affected: [ "T002207", "398363", "T012167", ], }, release_date: "2021-12-19T23:00:00.000+00:00", title: "CVE-2021-4136", }, ], }
WID-SEC-W-2022-1056
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, , um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen.", title: "Angriff", }, { category: "general", text: "- MacOS X", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-1056 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1056.json", }, { category: "self", summary: "WID-SEC-2022-1056 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1056", }, { category: "external", summary: "Apple Security Advisory vom 2022-03-14", url: "https://support.apple.com/en-us/HT213183", }, { category: "external", summary: "Apple Security Advisory vom 2022-03-14", url: "https://support.apple.com/en-us/HT213184", }, { category: "external", summary: "Apple Security Advisory vom 2022-03-14", url: "https://support.apple.com/en-us/HT213185", }, { category: "external", summary: "PoC von TrendMicro vom 2022-03-14", url: "https://www.trendmicro.com/en_us/research/22/d/macos-suhelper-root-privilege-escalation-vulnerability-a-deep-di.html", }, ], source_lang: "en-US", title: "Apple macOS: Mehrere Schwachstellen", tracking: { current_release_date: "2023-06-21T22:00:00.000+00:00", generator: { date: "2024-08-15T17:33:26.744+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-1056", initial_release_date: "2022-03-14T23:00:00.000+00:00", revision_history: [ { date: "2022-03-14T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2022-04-05T22:00:00.000+00:00", number: "2", summary: "Exploit aufgenommen", }, { date: "2022-08-16T22:00:00.000+00:00", number: "3", summary: "CVE ergänzt", }, { date: "2023-06-21T22:00:00.000+00:00", number: "4", summary: "CVE ergänzt", }, ], status: "final", version: "4", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Apple macOS Monterey < 12.3", product: { name: "Apple macOS Monterey < 12.3", product_id: "T022329", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:monterey__12.3", }, }, }, { category: "product_name", name: "Apple macOS Big Sur < 11.6.5", product: { name: "Apple macOS Big Sur < 11.6.5", product_id: "T022330", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:big_sur__11.6.5", }, }, }, { category: "product_name", name: "Apple macOS Catalina", product: { name: "Apple macOS Catalina", product_id: "T022331", product_identification_helper: { cpe: "cpe:/o:apple:mac_os:catalina", }, }, }, ], category: "product_name", name: "macOS", }, ], category: "vendor", name: "Apple", }, ], }, vulnerabilities: [ { cve: "CVE-2022-46706", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-46706", }, { cve: "CVE-2022-26690", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-26690", }, { cve: "CVE-2022-26688", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-26688", }, { cve: "CVE-2022-22672", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22672", }, { cve: "CVE-2022-22669", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22669", }, { cve: "CVE-2022-22668", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22668", }, { cve: "CVE-2022-22665", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22665", }, { cve: "CVE-2022-22664", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22664", }, { cve: "CVE-2022-22662", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22662", }, { cve: "CVE-2022-22661", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22661", }, { cve: "CVE-2022-22660", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22660", }, { cve: "CVE-2022-22657", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22657", }, { cve: "CVE-2022-22656", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22656", }, { cve: "CVE-2022-22655", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22655", }, { cve: "CVE-2022-22651", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22651", }, { cve: "CVE-2022-22650", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22650", }, { cve: "CVE-2022-22648", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22648", }, { cve: "CVE-2022-22647", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22647", }, { cve: "CVE-2022-22644", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22644", }, { cve: "CVE-2022-22643", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22643", }, { cve: "CVE-2022-22641", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22641", }, { cve: "CVE-2022-22640", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22640", }, { cve: "CVE-2022-22639", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22639", }, { cve: "CVE-2022-22638", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22638", }, { cve: "CVE-2022-22637", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22637", }, { cve: "CVE-2022-22633", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22633", }, { cve: "CVE-2022-22632", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22632", }, { cve: "CVE-2022-22631", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22631", }, { cve: "CVE-2022-22630", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22630", }, { cve: "CVE-2022-22629", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22629", }, { cve: "CVE-2022-22628", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22628", }, { cve: "CVE-2022-22627", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22627", }, { cve: "CVE-2022-22626", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22626", }, { cve: "CVE-2022-22625", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22625", }, { cve: "CVE-2022-22624", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22624", }, { cve: "CVE-2022-22623", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22623", }, { cve: "CVE-2022-22621", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22621", }, { cve: "CVE-2022-22617", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22617", }, { cve: "CVE-2022-22616", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22616", }, { cve: "CVE-2022-22615", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22615", }, { cve: "CVE-2022-22614", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22614", }, { cve: "CVE-2022-22613", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22613", }, { cve: "CVE-2022-22612", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22612", }, { cve: "CVE-2022-22611", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22611", }, { cve: "CVE-2022-22610", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22610", }, { cve: "CVE-2022-22609", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22609", }, { cve: "CVE-2022-22600", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22600", }, { cve: "CVE-2022-22599", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22599", }, { cve: "CVE-2022-22597", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22597", }, { cve: "CVE-2022-22582", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-22582", }, { cve: "CVE-2022-0158", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-0158", }, { cve: "CVE-2022-0156", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-0156", }, { cve: "CVE-2022-0128", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2022-0128", }, { cve: "CVE-2021-46059", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-46059", }, { cve: "CVE-2021-4193", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-4193", }, { cve: "CVE-2021-4192", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-4192", }, { cve: "CVE-2021-4187", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-4187", }, { cve: "CVE-2021-4173", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-4173", }, { cve: "CVE-2021-4166", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-4166", }, { cve: "CVE-2021-4136", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-4136", }, { cve: "CVE-2021-36976", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-36976", }, { cve: "CVE-2021-30918", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-30918", }, { cve: "CVE-2021-22947", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-22947", }, { cve: "CVE-2021-22946", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-22946", }, { cve: "CVE-2021-22945", notes: [ { category: "description", text: "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, einen Spoofing-Angriff durchzuführen und beliebigen Code auszuführen. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion.", }, ], product_status: { known_affected: [ "T022331", ], }, release_date: "2022-03-14T23:00:00.000+00:00", title: "CVE-2021-22945", }, ], }
ghsa-85p4-xh3v-w37r
Vulnerability from github
vim is vulnerable to Heap-based Buffer Overflow
{ affected: [], aliases: [ "CVE-2021-4136", ], database_specific: { cwe_ids: [ "CWE-122", "CWE-787", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2021-12-19T17:15:00Z", severity: "HIGH", }, details: "vim is vulnerable to Heap-based Buffer Overflow", id: "GHSA-85p4-xh3v-w37r", modified: "2022-03-17T00:06:28Z", published: "2021-12-20T00:00:39Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2021-4136", }, { type: "WEB", url: "https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264", }, { type: "WEB", url: "https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ", }, { type: "WEB", url: "https://security.gentoo.org/glsa/202208-32", }, { type: "WEB", url: "https://support.apple.com/kb/HT213183", }, { type: "WEB", url: "https://support.apple.com/kb/HT213256", }, { type: "WEB", url: "https://support.apple.com/kb/HT213343", }, { type: "WEB", url: "http://seclists.org/fulldisclosure/2022/Jul/14", }, { type: "WEB", url: "http://seclists.org/fulldisclosure/2022/Mar/29", }, { type: "WEB", url: "http://seclists.org/fulldisclosure/2022/May/35", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2022/01/15/1", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
fkie_cve-2021-4136
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
vim | vim | * | |
fedoraproject | fedora | 34 | |
fedoraproject | fedora | 35 | |
apple | mac_os_x | * | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | mac_os_x | 10.15.7 | |
apple | macos | * | |
apple | macos | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*", matchCriteriaId: "F0EE9D8B-46E1-4074-B967-8781DEC48FBC", versionEndExcluding: "8.2.3847", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", matchCriteriaId: "A930E247-0B43-43CB-98FF-6CE7B8189835", vulnerable: true, }, { criteria: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", matchCriteriaId: "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", matchCriteriaId: "DB8A73F8-3074-4B32-B9F6-343B6B1988C5", versionEndExcluding: "10.15.7", versionStartIncluding: "10.15", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", matchCriteriaId: "A654B8A2-FC30-4171-B0BB-366CD7ED4B6A", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*", matchCriteriaId: "F12CC8B5-C1EB-419E-8496-B9A3864656AD", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", matchCriteriaId: "F1F4BF7F-90D4-4668-B4E6-B06F4070F448", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*", matchCriteriaId: "7FD7176C-F4D1-43A7-9E49-BA92CA0D9980", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*", matchCriteriaId: "2703DE0B-8A9E-4A9D-9AE8-028E22BF47CA", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", matchCriteriaId: "0F441A43-1669-478D-9EC8-E96882DE4F9F", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", matchCriteriaId: "D425C653-37A2-448C-BF2F-B684ADB08A26", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*", matchCriteriaId: "A54D63B7-B92B-47C3-B1C5-9892E5873A98", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*", matchCriteriaId: "012052B5-9AA7-4FD3-9C80-5F615330039D", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*", matchCriteriaId: "50F21A3C-0AC3-48C5-A4F8-5A7B478875B4", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*", matchCriteriaId: "8E974DC6-F7D9-4389-9AF9-863F6E419CE6", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*", matchCriteriaId: "156A6382-2BD3-4882-90B2-8E7CF6659E17", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*", matchCriteriaId: "20A2FDB2-6712-406A-9896-C0B44508B07D", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*", matchCriteriaId: "49F537A0-DC42-4176-B22F-C80D179DD99D", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-004:*:*:*:*:*:*", matchCriteriaId: "1E463183-7E29-464F-B459-F3E1D62501FC", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", matchCriteriaId: "C1C795B9-E58D-467C-83A8-2D45C792292F", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", matchCriteriaId: "09A6345C-D813-43BA-B12E-789C80653F86", versionEndExcluding: "11.6.6", versionStartIncluding: "11.0", vulnerable: true, }, { criteria: "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", matchCriteriaId: "9C72309C-939F-4744-80DB-07C4452BDAFE", versionEndExcluding: "12.3", versionStartIncluding: "12.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "vim is vulnerable to Heap-based Buffer Overflow", }, { lang: "es", value: "vim es vulnerable al desbordamiento del búfer en la región Heap de la memoria", }, ], id: "CVE-2021-4136", lastModified: "2024-11-21T06:36:58.833", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", version: "3.0", }, exploitabilityScore: 1.8, impactScore: 5.5, source: "security@huntr.dev", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-12-19T17:15:07.553", references: [ { source: "security@huntr.dev", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Jul/14", }, { source: "security@huntr.dev", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Mar/29", }, { source: "security@huntr.dev", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/May/35", }, { source: "security@huntr.dev", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2022/01/15/1", }, { source: "security@huntr.dev", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264", }, { source: "security@huntr.dev", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938", }, { source: "security@huntr.dev", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/", }, { source: "security@huntr.dev", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/", }, { source: "security@huntr.dev", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-32", }, { source: "security@huntr.dev", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213183", }, { source: "security@huntr.dev", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213256", }, { source: "security@huntr.dev", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213343", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Jul/14", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Mar/29", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/May/35", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2022/01/15/1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-32", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213183", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213256", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213343", }, ], sourceIdentifier: "security@huntr.dev", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-122", }, ], source: "security@huntr.dev", type: "Primary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Secondary", }, ], }
gsd-2021-4136
Vulnerability from gsd
{ GSD: { alias: "CVE-2021-4136", description: "vim is vulnerable to Heap-based Buffer Overflow", id: "GSD-2021-4136", references: [ "https://www.suse.com/security/cve/CVE-2021-4136.html", "https://advisories.mageia.org/CVE-2021-4136.html", "https://alas.aws.amazon.com/cve/html/CVE-2021-4136.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2021-4136", ], details: "vim is vulnerable to Heap-based Buffer Overflow", id: "GSD-2021-4136", modified: "2023-12-13T01:23:11.490662Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2021-4136", STATE: "PUBLIC", TITLE: "Heap-based Buffer Overflow in vim/vim", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "vim/vim", version: { version_data: [ { version_affected: "<", version_value: "8.2.3846", }, ], }, }, ], }, vendor_name: "vim", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "vim is vulnerable to Heap-based Buffer Overflow", }, ], }, impact: { cvss: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 7.3, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-122 Heap-based Buffer Overflow", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938", refsource: "CONFIRM", url: "https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938", }, { name: "https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264", refsource: "MISC", url: "https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264", }, { name: "FEDORA-2022-a3d70b50f0", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/", }, { name: "[oss-security] 20220114 Re: 3 new CVE's in vim", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2022/01/15/1", }, { name: "FEDORA-2022-48b86d586f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/", }, { name: "https://support.apple.com/kb/HT213183", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT213183", }, { name: "20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2022/Mar/29", }, { name: "https://support.apple.com/kb/HT213256", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT213256", }, { name: "20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2022/May/35", }, { name: "https://support.apple.com/kb/HT213343", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT213343", }, { name: "20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2022/Jul/14", }, { name: "GLSA-202208-32", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/202208-32", }, ], }, source: { advisory: "5c6b93c1-2d27-4e98-a931-147877b8c938", discovery: "EXTERNAL", }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "8.2.3847", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.15.7", versionStartIncluding: "10.15", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "12.3", versionStartIncluding: "12.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "11.6.6", versionStartIncluding: "11.0", vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-004:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "security@huntr.dev", ID: "CVE-2021-4136", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "vim is vulnerable to Heap-based Buffer Overflow", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-122", }, ], }, ], }, references: { reference_data: [ { name: "https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938", refsource: "CONFIRM", tags: [ "Exploit", "Patch", "Third Party Advisory", ], url: "https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938", }, { name: "https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264", }, { name: "FEDORA-2022-a3d70b50f0", refsource: "FEDORA", tags: [ "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/", }, { name: "[oss-security] 20220114 Re: 3 new CVE's in vim", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2022/01/15/1", }, { name: "FEDORA-2022-48b86d586f", refsource: "FEDORA", tags: [ "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/", }, { name: "https://support.apple.com/kb/HT213183", refsource: "CONFIRM", tags: [ "Release Notes", "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213183", }, { name: "20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3", refsource: "FULLDISC", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Mar/29", }, { name: "https://support.apple.com/kb/HT213256", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213256", }, { name: "20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6", refsource: "FULLDISC", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/May/35", }, { name: "https://support.apple.com/kb/HT213343", refsource: "CONFIRM", tags: [ "Third Party Advisory", ], url: "https://support.apple.com/kb/HT213343", }, { name: "20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina", refsource: "FULLDISC", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2022/Jul/14", }, { name: "GLSA-202208-32", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/202208-32", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: true, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, }, }, lastModifiedDate: "2022-09-01T14:06Z", publishedDate: "2021-12-19T17:15Z", }, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.