Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-1154 (GCVE-0-2022-1154)
Vulnerability from cvelistv5 – Published: 2022-03-30 00:00 – Updated: 2024-08-02 23:55- CWE-416 - Use After Free
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T23:55:24.251Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5"
},
{
"name": "FEDORA-2022-d776fcfe60",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/"
},
{
"name": "FEDORA-2022-e62adccfca",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/"
},
{
"name": "[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"name": "GLSA-202208-32",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"name": "[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html"
},
{
"name": "GLSA-202305-16",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202305-16"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "vim/vim",
"vendor": "vim",
"versions": [
{
"lessThan": "8.2.4646",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416 Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-03T00:00:00.000Z",
"orgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
"shortName": "@huntrdev"
},
"references": [
{
"url": "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425"
},
{
"url": "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5"
},
{
"name": "FEDORA-2022-d776fcfe60",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/"
},
{
"name": "FEDORA-2022-e62adccfca",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/"
},
{
"name": "[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html"
},
{
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"name": "GLSA-202208-32",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"name": "[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html"
},
{
"name": "GLSA-202305-16",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202305-16"
}
],
"source": {
"advisory": "7f0ec6bc-ea0e-45b0-8128-caac72d23425",
"discovery": "EXTERNAL"
},
"title": "Use after free in utf_ptr2char in vim/vim"
}
},
"cveMetadata": {
"assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
"assignerShortName": "@huntrdev",
"cveId": "CVE-2022-1154",
"datePublished": "2022-03-30T00:00:00.000Z",
"dateReserved": "2022-03-29T00:00:00.000Z",
"dateUpdated": "2024-08-02T23:55:24.251Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"8.2.4646\", \"matchCriteriaId\": \"D2771F51-99CD-4914-9DBB-55E53B495B93\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A930E247-0B43-43CB-98FF-6CE7B8189835\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9955F62A-75D3-4347-9AD3-5947FC365838\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.\"}, {\"lang\": \"es\", \"value\": \"Un uso de memoria previamente liberada en utf_ptr2char en el repositorio de GitHub vim/vim versiones anteriores a 8.2\"}]",
"id": "CVE-2022-1154",
"lastModified": "2024-11-21T06:40:08.687",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV30\": [{\"source\": \"security@huntr.dev\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.1, \"impactScore\": 6.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2022-03-30T12:15:07.943",
"references": "[{\"url\": \"https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5\", \"source\": \"security@huntr.dev\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425\", \"source\": \"security@huntr.dev\", \"tags\": [\"Exploit\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html\", \"source\": \"security@huntr.dev\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html\", \"source\": \"security@huntr.dev\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/\", \"source\": \"security@huntr.dev\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/\", \"source\": \"security@huntr.dev\"}, {\"url\": \"https://security.gentoo.org/glsa/202208-32\", \"source\": \"security@huntr.dev\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202305-16\", \"source\": \"security@huntr.dev\"}, {\"url\": \"https://www.oracle.com/security-alerts/cpujul2022.html\", \"source\": \"security@huntr.dev\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/202208-32\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202305-16\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.oracle.com/security-alerts/cpujul2022.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "security@huntr.dev",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security@huntr.dev\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-1154\",\"sourceIdentifier\":\"security@huntr.dev\",\"published\":\"2022-03-30T12:15:07.943\",\"lastModified\":\"2024-11-21T06:40:08.687\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.\"},{\"lang\":\"es\",\"value\":\"Un uso de memoria previamente liberada en utf_ptr2char en el repositorio de GitHub vim/vim versiones anteriores a 8.2\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.1,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"security@huntr.dev\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2.4646\",\"matchCriteriaId\":\"D2771F51-99CD-4914-9DBB-55E53B495B93\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9955F62A-75D3-4347-9AD3-5947FC365838\"}]}]}],\"references\":[{\"url\":\"https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5\",\"source\":\"security@huntr.dev\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425\",\"source\":\"security@huntr.dev\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/\",\"source\":\"security@huntr.dev\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/\",\"source\":\"security@huntr.dev\"},{\"url\":\"https://security.gentoo.org/glsa/202208-32\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202305-16\",\"source\":\"security@huntr.dev\"},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202208-32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202305-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
RHSA-2022_5242
Vulnerability from csaf_redhat - Published: 2022-07-01 00:06 - Updated: 2024-11-22 19:07Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for vim is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Use of Out-of-range Pointer Offset in vim (CVE-2022-0554)\n\n* vim: Heap-based Buffer Overflow occurs in vim (CVE-2022-0943)\n\n* vim: Out-of-range Pointer Offset (CVE-2022-1420)\n\n* vim: heap buffer overflow (CVE-2022-1621)\n\n* vim: buffer over-read (CVE-2022-1629)\n\n* vim: use after free in utf_ptr2char (CVE-2022-1154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5242",
"url": "https://access.redhat.com/errata/RHSA-2022:5242"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2058483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058483"
},
{
"category": "external",
"summary": "2064064",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064064"
},
{
"category": "external",
"summary": "2073013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073013"
},
{
"category": "external",
"summary": "2077734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077734"
},
{
"category": "external",
"summary": "2083924",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083924"
},
{
"category": "external",
"summary": "2083931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083931"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5242.json"
}
],
"title": "Red Hat Security Advisory: vim security update",
"tracking": {
"current_release_date": "2024-11-22T19:07:38+00:00",
"generator": {
"date": "2024-11-22T19:07:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:5242",
"initial_release_date": "2022-07-01T00:06:08+00:00",
"revision_history": [
{
"date": "2022-07-01T00:06:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-07-01T00:06:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T19:07:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-2:8.2.2637-16.el9_0.2.src",
"product": {
"name": "vim-2:8.2.2637-16.el9_0.2.src",
"product_id": "vim-2:8.2.2637-16.el9_0.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim@8.2.2637-16.el9_0.2?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"product": {
"name": "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"product_id": "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-filesystem@8.2.2637-16.el9_0.2?arch=noarch\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-common-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-2:8.2.2637-16.el9_0.2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src"
},
"product_reference": "vim-2:8.2.2637-16.el9_0.2.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-common-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch"
},
"product_reference": "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-2:8.2.2637-16.el9_0.2.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src"
},
"product_reference": "vim-2:8.2.2637-16.el9_0.2.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-common-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch"
},
"product_reference": "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-0554",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2058483"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in vim that causes an out-of-range pointer offset vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: Use of Out-of-range Pointer Offset in vim",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0554"
},
{
"category": "external",
"summary": "RHBZ#2058483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058483"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0554"
}
],
"release_date": "2022-01-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:06:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5242"
},
{
"category": "workaround",
"details": "Untrusted vim scripts with -s [scriptin] are not recommended to run.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: Use of Out-of-range Pointer Offset in vim"
},
{
"cve": "CVE-2022-0943",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-03-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064064"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in vim\u0027s suggest_try_change() function of the spellsuggest.c file. This flaw allows an attacker to trick a user into opening a crafted file, triggering a heap-overflow and causing an application to crash, which leads to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: Heap-based Buffer Overflow occurs in vim",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux - 6, 7, 8 are not affected, because vulnerable code is not present in binary RPMs of Vim shipped with RHEL.\n\nRed Hat Enterprise Virtualization 4 consumes RHEL-8 vim, and as RHEL-8 is not affected, Hence, RHEV is also not affected.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0943"
},
{
"category": "external",
"summary": "RHBZ#2064064",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064064"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0943"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0943",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0943"
}
],
"release_date": "2022-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:06:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5242"
},
{
"category": "workaround",
"details": "Untrusted vim scripts with -s [scriptin] are not recommended to run.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: Heap-based Buffer Overflow occurs in vim"
},
{
"cve": "CVE-2022-1154",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073013"
}
],
"notes": [
{
"category": "description",
"text": "A heap use-after-free vulnerability was found in Vim\u0027s utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because vim is using a buffer line after it has been freed in the old regexp engine. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: use after free in utf_ptr2char",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "All versions of Vim shipped with Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base.\n\nRed Hat Enterprise Virtualization 4 consumes RHEL-8 vim, and as RHEL-8 is affected, Hence, RHEV is also affected.\n\nRed Hat Product Security has rated this issue as having a Low security impact, because the \"victim\" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.\n\nSince Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1154"
},
{
"category": "external",
"summary": "RHBZ#2073013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073013"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154"
}
],
"release_date": "2022-04-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:06:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5242"
},
{
"category": "workaround",
"details": "Untrusted vim scripts with -s [scriptin] are not recommended to run.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "vim: use after free in utf_ptr2char"
},
{
"cve": "CVE-2022-1420",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2077734"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Vim. The issue occurs when using a number in a string for the lambda name, triggering an out-of-range pointer offset vulnerability. This flaw allows an attacker to trick a user into opening a crafted script containing an argument as a number and then using it as a string pointer to access any memory location, causing an application to crash and possibly access some memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: Out-of-range Pointer Offset",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1420"
},
{
"category": "external",
"summary": "RHBZ#2077734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077734"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1420"
}
],
"release_date": "2022-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:06:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5242"
},
{
"category": "workaround",
"details": "Untrusted vim scripts with -s [scriptin] are not recommended to run.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: Out-of-range Pointer Offset"
},
{
"cve": "CVE-2022-1621",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2083924"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in vim, where it is vulnerable to a heap buffer overflow in the vim_strncpy find_word function. This flaw allows a specially crafted file to crash software, modify memory and possibly perform remote execution when opened in vim.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: heap buffer overflow in vim_strncpy",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1621"
},
{
"category": "external",
"summary": "RHBZ#2083924",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083924"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1621"
},
{
"category": "external",
"summary": "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb",
"url": "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb"
}
],
"release_date": "2022-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:06:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.0"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: heap buffer overflow in vim_strncpy"
},
{
"cve": "CVE-2022-1629",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"discovery_date": "2022-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2083931"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in vim, where it is vulnerable to a buffer over-read in the find_next_quote function. This flaw allows a specially crafted file to crash software, modify memory and possibly perform remote execution when opened in vim.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: buffer over-read in function find_next_quote",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having a Low security impact, because the \"victim\" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1629"
},
{
"category": "external",
"summary": "RHBZ#2083931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083931"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1629"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1629",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1629"
},
{
"category": "external",
"summary": "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee",
"url": "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee"
}
],
"release_date": "2022-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:06:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: buffer over-read in function find_next_quote"
}
]
}
RHSA-2022:5242
Vulnerability from csaf_redhat - Published: 2022-07-01 00:06 - Updated: 2026-02-24 20:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for vim is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: Use of Out-of-range Pointer Offset in vim (CVE-2022-0554)\n\n* vim: Heap-based Buffer Overflow occurs in vim (CVE-2022-0943)\n\n* vim: Out-of-range Pointer Offset (CVE-2022-1420)\n\n* vim: heap buffer overflow (CVE-2022-1621)\n\n* vim: buffer over-read (CVE-2022-1629)\n\n* vim: use after free in utf_ptr2char (CVE-2022-1154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5242",
"url": "https://access.redhat.com/errata/RHSA-2022:5242"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2058483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058483"
},
{
"category": "external",
"summary": "2064064",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064064"
},
{
"category": "external",
"summary": "2073013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073013"
},
{
"category": "external",
"summary": "2077734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077734"
},
{
"category": "external",
"summary": "2083924",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083924"
},
{
"category": "external",
"summary": "2083931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083931"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5242.json"
}
],
"title": "Red Hat Security Advisory: vim security update",
"tracking": {
"current_release_date": "2026-02-24T20:38:47+00:00",
"generator": {
"date": "2026-02-24T20:38:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2022:5242",
"initial_release_date": "2022-07-01T00:06:08+00:00",
"revision_history": [
{
"date": "2022-07-01T00:06:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-07-01T00:06:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-24T20:38:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-2:8.2.2637-16.el9_0.2.src",
"product": {
"name": "vim-2:8.2.2637-16.el9_0.2.src",
"product_id": "vim-2:8.2.2637-16.el9_0.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim@8.2.2637-16.el9_0.2?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"product": {
"name": "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"product_id": "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-filesystem@8.2.2637-16.el9_0.2?arch=noarch\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"product": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"product_id": "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"product": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"product_id": "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"product": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"product_id": "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-common-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"product": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"product_id": "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.2.2637-16.el9_0.2?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-2:8.2.2637-16.el9_0.2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src"
},
"product_reference": "vim-2:8.2.2637-16.el9_0.2.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-common-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch"
},
"product_reference": "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-2:8.2.2637-16.el9_0.2.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src"
},
"product_reference": "vim-2:8.2.2637-16.el9_0.2.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-common-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch"
},
"product_reference": "vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-0554",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-02-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2058483"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in vim that causes an out-of-range pointer offset vulnerability. This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: Use of Out-of-range Pointer Offset in vim",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0554"
},
{
"category": "external",
"summary": "RHBZ#2058483",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058483"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0554"
}
],
"release_date": "2022-01-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:06:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5242"
},
{
"category": "workaround",
"details": "Untrusted vim scripts with -s [scriptin] are not recommended to run.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: Use of Out-of-range Pointer Offset in vim"
},
{
"cve": "CVE-2022-0943",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-03-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064064"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in vim\u0027s suggest_try_change() function of the spellsuggest.c file. This flaw allows an attacker to trick a user into opening a crafted file, triggering a heap-overflow and causing an application to crash, which leads to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: Heap-based Buffer Overflow occurs in vim",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux - 6, 7, 8 are not affected, because vulnerable code is not present in binary RPMs of Vim shipped with RHEL.\n\nRed Hat Enterprise Virtualization 4 consumes RHEL-8 vim, and as RHEL-8 is not affected, Hence, RHEV is also not affected.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0943"
},
{
"category": "external",
"summary": "RHBZ#2064064",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064064"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0943"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0943",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0943"
}
],
"release_date": "2022-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:06:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5242"
},
{
"category": "workaround",
"details": "Untrusted vim scripts with -s [scriptin] are not recommended to run.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: Heap-based Buffer Overflow occurs in vim"
},
{
"cve": "CVE-2022-1154",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073013"
}
],
"notes": [
{
"category": "description",
"text": "A heap use-after-free vulnerability was found in Vim\u0027s utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because vim is using a buffer line after it has been freed in the old regexp engine. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: use after free in utf_ptr2char",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "All versions of Vim shipped with Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base.\n\nRed Hat Enterprise Virtualization 4 consumes RHEL-8 vim, and as RHEL-8 is affected, Hence, RHEV is also affected.\n\nRed Hat Product Security has rated this issue as having a Low security impact, because the \"victim\" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.\n\nSince Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1154"
},
{
"category": "external",
"summary": "RHBZ#2073013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073013"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154"
}
],
"release_date": "2022-04-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:06:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5242"
},
{
"category": "workaround",
"details": "Untrusted vim scripts with -s [scriptin] are not recommended to run.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "vim: use after free in utf_ptr2char"
},
{
"cve": "CVE-2022-1420",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2077734"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Vim. The issue occurs when using a number in a string for the lambda name, triggering an out-of-range pointer offset vulnerability. This flaw allows an attacker to trick a user into opening a crafted script containing an argument as a number and then using it as a string pointer to access any memory location, causing an application to crash and possibly access some memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: Out-of-range Pointer Offset",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1420"
},
{
"category": "external",
"summary": "RHBZ#2077734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077734"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1420"
}
],
"release_date": "2022-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:06:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5242"
},
{
"category": "workaround",
"details": "Untrusted vim scripts with -s [scriptin] are not recommended to run.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: Out-of-range Pointer Offset"
},
{
"cve": "CVE-2022-1621",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2083924"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in vim, where it is vulnerable to a heap buffer overflow in the vim_strncpy find_word function. This flaw allows a specially crafted file to crash software, modify memory and possibly perform remote execution when opened in vim.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: heap buffer overflow in vim_strncpy",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1621"
},
{
"category": "external",
"summary": "RHBZ#2083924",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083924"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1621"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1621",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1621"
},
{
"category": "external",
"summary": "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb",
"url": "https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb"
}
],
"release_date": "2022-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:06:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H",
"version": "3.0"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: heap buffer overflow in vim_strncpy"
},
{
"cve": "CVE-2022-1629",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-05-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2083931"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in vim, where it is vulnerable to a buffer over-read in the find_next_quote function. This flaw allows a specially crafted file to crash software, modify memory and possibly perform remote execution when opened in vim.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: buffer over-read in function find_next_quote",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having a Low security impact, because the \"victim\" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1629"
},
{
"category": "external",
"summary": "RHBZ#2083931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083931"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1629"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1629",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1629"
},
{
"category": "external",
"summary": "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee",
"url": "https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee"
}
],
"release_date": "2022-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:06:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5242"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-2:8.2.2637-16.el9_0.2.src",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-X11-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-common-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-debugsource-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-enhanced-debuginfo-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-filesystem-2:8.2.2637-16.el9_0.2.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-2:8.2.2637-16.el9_0.2.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:vim-minimal-debuginfo-2:8.2.2637-16.el9_0.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vim: buffer over-read in function find_next_quote"
}
]
}
RHSA-2022_1552
Vulnerability from csaf_redhat - Published: 2022-04-26 21:55 - Updated: 2024-11-22 18:55Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for vim is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives a\ndetailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: use after free in utf_ptr2char (CVE-2022-1154)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1552",
"url": "https://access.redhat.com/errata/RHSA-2022:1552"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2073013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073013"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1552.json"
}
],
"title": "Red Hat Security Advisory: vim security update",
"tracking": {
"current_release_date": "2024-11-22T18:55:39+00:00",
"generator": {
"date": "2024-11-22T18:55:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:1552",
"initial_release_date": "2022-04-26T21:55:26+00:00",
"revision_history": [
{
"date": "2022-04-26T21:55:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-26T21:55:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T18:55:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-common-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"product": {
"name": "vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"product_id": "vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-filesystem@8.0.1763-16.el8_5.13?arch=noarch\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-2:8.0.1763-16.el8_5.13.src",
"product": {
"name": "vim-2:8.0.1763-16.el8_5.13.src",
"product_id": "vim-2:8.0.1763-16.el8_5.13.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim@8.0.1763-16.el8_5.13?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-2:8.0.1763-16.el8_5.13.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src"
},
"product_reference": "vim-2:8.0.1763-16.el8_5.13.src",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-common-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:8.0.1763-16.el8_5.13.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch"
},
"product_reference": "vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-2:8.0.1763-16.el8_5.13.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src"
},
"product_reference": "vim-2:8.0.1763-16.el8_5.13.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-common-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:8.0.1763-16.el8_5.13.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch"
},
"product_reference": "vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1154",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073013"
}
],
"notes": [
{
"category": "description",
"text": "A heap use-after-free vulnerability was found in Vim\u0027s utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because vim is using a buffer line after it has been freed in the old regexp engine. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: use after free in utf_ptr2char",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "All versions of Vim shipped with Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base.\n\nRed Hat Enterprise Virtualization 4 consumes RHEL-8 vim, and as RHEL-8 is affected, Hence, RHEV is also affected.\n\nRed Hat Product Security has rated this issue as having a Low security impact, because the \"victim\" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.\n\nSince Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1154"
},
{
"category": "external",
"summary": "RHBZ#2073013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073013"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154"
}
],
"release_date": "2022-04-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T21:55:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in\nthis advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1552"
},
{
"category": "workaround",
"details": "Untrusted vim scripts with -s [scriptin] are not recommended to run.",
"product_ids": [
"AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "vim: use after free in utf_ptr2char"
}
]
}
RHSA-2022:1552
Vulnerability from csaf_redhat - Published: 2022-04-26 21:55 - Updated: 2025-11-21 18:30Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for vim is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of\nModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives a\ndetailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: use after free in utf_ptr2char (CVE-2022-1154)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1552",
"url": "https://access.redhat.com/errata/RHSA-2022:1552"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2073013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073013"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1552.json"
}
],
"title": "Red Hat Security Advisory: vim security update",
"tracking": {
"current_release_date": "2025-11-21T18:30:08+00:00",
"generator": {
"date": "2025-11-21T18:30:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2022:1552",
"initial_release_date": "2022-04-26T21:55:26+00:00",
"revision_history": [
{
"date": "2022-04-26T21:55:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-04-26T21:55:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:30:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"product": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"product_id": "vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.13?arch=aarch64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"product": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"product_id": "vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.13?arch=ppc64le\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"product": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"product_id": "vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.13?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-common-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debugsource@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-X11-debuginfo@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-common-debuginfo@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-debuginfo@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-enhanced-debuginfo@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal-debuginfo@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"product": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"product_id": "vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-minimal@8.0.1763-16.el8_5.13?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"product": {
"name": "vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"product_id": "vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim-filesystem@8.0.1763-16.el8_5.13?arch=noarch\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "vim-2:8.0.1763-16.el8_5.13.src",
"product": {
"name": "vim-2:8.0.1763-16.el8_5.13.src",
"product_id": "vim-2:8.0.1763-16.el8_5.13.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/vim@8.0.1763-16.el8_5.13?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-2:8.0.1763-16.el8_5.13.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src"
},
"product_reference": "vim-2:8.0.1763-16.el8_5.13.src",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-common-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:8.0.1763-16.el8_5.13.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch"
},
"product_reference": "vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "AppStream-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-2:8.0.1763-16.el8_5.13.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src"
},
"product_reference": "vim-2:8.0.1763-16.el8_5.13.src",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-common-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-filesystem-2:8.0.1763-16.el8_5.13.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch"
},
"product_reference": "vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
},
"product_reference": "vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"relates_to_product_reference": "BaseOS-8.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1154",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073013"
}
],
"notes": [
{
"category": "description",
"text": "A heap use-after-free vulnerability was found in Vim\u0027s utf_ptr2char() function of the src/mbyte.c file. This flaw occurs because vim is using a buffer line after it has been freed in the old regexp engine. This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap use-after-free that causes an application to crash, possibly executing code and corrupting memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vim: use after free in utf_ptr2char",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "All versions of Vim shipped with Red Hat Enterprise Linux are affected, because of the presence of vulnerable code in our code-base.\n\nRed Hat Enterprise Virtualization 4 consumes RHEL-8 vim, and as RHEL-8 is affected, Hence, RHEV is also affected.\n\nRed Hat Product Security has rated this issue as having a Low security impact, because the \"victim\" has to run an untrusted file IN SCRIPT MODE. Someone who is running untrusted files in script mode is equivalent to someone just taking a random python script and running it.\n\nSince Red Hat Enterprise Linux 6, 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1154"
},
{
"category": "external",
"summary": "RHBZ#2073013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073013"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154"
}
],
"release_date": "2022-04-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-26T21:55:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in\nthis advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1552"
},
{
"category": "workaround",
"details": "Untrusted vim scripts with -s [scriptin] are not recommended to run.",
"product_ids": [
"AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"AppStream-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-2:8.0.1763-16.el8_5.13.src",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-X11-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-X11-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-common-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-common-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-debugsource-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-enhanced-debuginfo-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-filesystem-2:8.0.1763-16.el8_5.13.noarch",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-2:8.0.1763-16.el8_5.13.x86_64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.aarch64",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.ppc64le",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.s390x",
"BaseOS-8.5.0.Z.MAIN:vim-minimal-debuginfo-2:8.0.1763-16.el8_5.13.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "vim: use after free in utf_ptr2char"
}
]
}
CERTFR-2022-AVI-952
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM QRadar. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar SIEM versions 7.5 ant\u00e9rieures \u00e0 7.5.0 Update Pack 3",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.4 ant\u00e9rieures \u00e0 7.4.3 Fix Pack 7",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33036"
},
{
"name": "CVE-2022-30973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30973"
},
{
"name": "CVE-2021-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38185"
},
{
"name": "CVE-2022-25169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25169"
},
{
"name": "CVE-2022-25762",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25762"
},
{
"name": "CVE-2022-2048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2048"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"name": "CVE-2022-2047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2047"
},
{
"name": "CVE-2021-37404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37404"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-22968",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22968"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-1552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1552"
},
{
"name": "CVE-2020-15522",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15522"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-1154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1154"
},
{
"name": "CVE-2022-30126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30126"
},
{
"name": "CVE-2022-29885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29885"
},
{
"name": "CVE-2022-33879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33879"
},
{
"name": "CVE-2021-3634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3634"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-952",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM QRadar.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM QRadar",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6831853 du 25 octobre 2022",
"url": "https://www.ibm.com/support/pages/node/6831853"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6831855 du 25 octobre 2022",
"url": "https://www.ibm.com/support/pages/node/6831855"
}
]
}
CERTFR-2022-AVI-952
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans IBM QRadar. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar SIEM versions 7.5 ant\u00e9rieures \u00e0 7.5.0 Update Pack 3",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.4 ant\u00e9rieures \u00e0 7.4.3 Fix Pack 7",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33036"
},
{
"name": "CVE-2022-30973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30973"
},
{
"name": "CVE-2021-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38185"
},
{
"name": "CVE-2022-25169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25169"
},
{
"name": "CVE-2022-25762",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25762"
},
{
"name": "CVE-2022-2048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2048"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"name": "CVE-2022-2047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2047"
},
{
"name": "CVE-2021-37404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37404"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-22968",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22968"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2022-1552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1552"
},
{
"name": "CVE-2020-15522",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15522"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-1154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1154"
},
{
"name": "CVE-2022-30126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30126"
},
{
"name": "CVE-2022-29885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29885"
},
{
"name": "CVE-2022-33879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33879"
},
{
"name": "CVE-2021-3634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3634"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-952",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM QRadar.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM QRadar",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6831853 du 25 octobre 2022",
"url": "https://www.ibm.com/support/pages/node/6831853"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6831855 du 25 octobre 2022",
"url": "https://www.ibm.com/support/pages/node/6831855"
}
]
}
cve-2022-1154
Vulnerability from osv_almalinux
Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
- vim: use after free in utf_ptr2char (CVE-2022-1154)
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "vim-X11"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:8.0.1763-16.el8_5.13"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "vim-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:8.0.1763-16.el8_5.13"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "vim-enhanced"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:8.0.1763-16.el8_5.13"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "vim-filesystem"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:8.0.1763-16.el8_5.13"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "vim-minimal"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:8.0.1763-16.el8_5.13"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Vim (Vi IMproved) is an updated and improved version of the vi editor.\n\nSecurity Fix(es):\n\n* vim: use after free in utf_ptr2char (CVE-2022-1154)",
"id": "ALSA-2022:1552",
"modified": "2022-04-27T15:05:20Z",
"published": "2022-04-26T13:49:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2022-1552.html"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-1154"
}
],
"related": [
"CVE-2022-1154"
],
"summary": "Moderate: vim security update"
}
cve-2022-1154
Vulnerability from osv_almalinux
Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: Use of Out-of-range Pointer Offset in vim (CVE-2022-0554) * vim: Heap-based Buffer Overflow occurs in vim (CVE-2022-0943) * vim: Out-of-range Pointer Offset (CVE-2022-1420) * vim: heap buffer overflow (CVE-2022-1621) * vim: buffer over-read (CVE-2022-1629) * vim: use after free in utf_ptr2char (CVE-2022-1154) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "vim-X11"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:8.2.2637-16.el9_0.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "vim-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:8.2.2637-16.el9_0.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "vim-enhanced"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:8.2.2637-16.el9_0.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "vim-filesystem"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:8.2.2637-16.el9_0.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "vim-minimal"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2:8.2.2637-16.el9_0.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Vim (Vi IMproved) is an updated and improved version of the vi editor.\nSecurity Fix(es):\n* vim: Use of Out-of-range Pointer Offset in vim (CVE-2022-0554)\n* vim: Heap-based Buffer Overflow occurs in vim (CVE-2022-0943)\n* vim: Out-of-range Pointer Offset (CVE-2022-1420)\n* vim: heap buffer overflow (CVE-2022-1621)\n* vim: buffer over-read (CVE-2022-1629)\n* vim: use after free in utf_ptr2char (CVE-2022-1154)\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2022:5242",
"modified": "2022-07-21T17:37:48Z",
"published": "2022-07-01T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:5242"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-0554"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-0943"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-1154"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-1420"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-1621"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-1629"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2058483"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2064064"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2073013"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2077734"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2083924"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2083931"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2022-5242.html"
}
],
"related": [
"CVE-2022-0554",
"CVE-2022-0943",
"CVE-2022-1420",
"CVE-2022-1621",
"CVE-2022-1629",
"CVE-2022-1154"
],
"summary": "Moderate: vim security update"
}
FKIE_CVE-2022-1154
Vulnerability from fkie_nvd - Published: 2022-03-30 12:15 - Updated: 2024-11-21 06:40| URL | Tags | ||
|---|---|---|---|
| security@huntr.dev | https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5 | Patch, Third Party Advisory | |
| security@huntr.dev | https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425 | Exploit, Patch, Third Party Advisory | |
| security@huntr.dev | https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html | Third Party Advisory | |
| security@huntr.dev | https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html | Mailing List, Third Party Advisory | |
| security@huntr.dev | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/ | ||
| security@huntr.dev | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/ | ||
| security@huntr.dev | https://security.gentoo.org/glsa/202208-32 | Third Party Advisory | |
| security@huntr.dev | https://security.gentoo.org/glsa/202305-16 | ||
| security@huntr.dev | https://www.oracle.com/security-alerts/cpujul2022.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425 | Exploit, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202208-32 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202305-16 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2022.html | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| vim | vim | * | |
| fedoraproject | fedora | 34 | |
| fedoraproject | fedora | 35 | |
| debian | debian_linux | 9.0 | |
| debian | debian_linux | 10.0 | |
| oracle | communications_cloud_native_core_network_exposure_function | 22.1.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D2771F51-99CD-4914-9DBB-55E53B495B93",
"versionEndExcluding": "8.2.4646",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9955F62A-75D3-4347-9AD3-5947FC365838",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646."
},
{
"lang": "es",
"value": "Un uso de memoria previamente liberada en utf_ptr2char en el repositorio de GitHub vim/vim versiones anteriores a 8.2"
}
],
"id": "CVE-2022-1154",
"lastModified": "2024-11-21T06:40:08.687",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.1,
"impactScore": 6.0,
"source": "security@huntr.dev",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-03-30T12:15:07.943",
"references": [
{
"source": "security@huntr.dev",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5"
},
{
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425"
},
{
"source": "security@huntr.dev",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html"
},
{
"source": "security@huntr.dev",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html"
},
{
"source": "security@huntr.dev",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/"
},
{
"source": "security@huntr.dev",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/"
},
{
"source": "security@huntr.dev",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"source": "security@huntr.dev",
"url": "https://security.gentoo.org/glsa/202305-16"
},
{
"source": "security@huntr.dev",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/202305-16"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
],
"sourceIdentifier": "security@huntr.dev",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "security@huntr.dev",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
}
CVE-2022-1154
Vulnerability from csaf_phoenixcontactgmbhcokg - Published: 2022-11-10 07:00 - Updated: 2025-05-22 13:03Notes
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "UPDATE A: Two devices (ENERGY AXC PU, SMARTRTU AXC SG) added (24.11.2022) Update for PLCnext Firmware containing fixes for recent vulnerability findings in Linux components and security enhancements. PLCnext Control AXC F x152 is certified according to IEC 62443-4-1 and IEC 62443-4-2. This certification requires that all third-party components used in the firmware are regularly checked for known vulnerabilities.",
"title": "Summary"
},
{
"category": "description",
"text": "Availability, integrity, or confidentiality of the PLCnext Control might be compromised by attacks using these vulnerabilities.",
"title": "Impact"
},
{
"category": "description",
"text": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"title": "Mitigation"
},
{
"category": "description",
"text": "Update to the latest LTS Firmware Release.\nUpdate to the latest LTS PLCnext Engineer Release.\n\nPlease check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@phoenixcontact.com",
"name": "Phoenix Contact GmbH \u0026 Co. KG",
"namespace": "https://phoenixcontact.com/psirt"
},
"references": [
{
"category": "external",
"summary": "PHOENIX CONTACT PSIRT ",
"url": "https://phoenixcontact.com/psirt"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for PHOENIX CONTACT",
"url": "https://certvde.com/en/advisories/vendor/phoenixcontact/"
},
{
"category": "self",
"summary": "VDE-2022-046: PHOENIX CONTACT: Multiple Linux component vulnerabilities in PLCnext Firmware - HTML",
"url": "https://certvde.com/en/advisories/VDE-2022-046/"
},
{
"category": "self",
"summary": "VDE-2022-046: PHOENIX CONTACT: Multiple Linux component vulnerabilities in PLCnext Firmware - CSAF",
"url": "https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-046.json"
}
],
"title": "PHOENIX CONTACT: Multiple Linux component vulnerabilities in PLCnext Firmware",
"tracking": {
"aliases": [
"VDE-2022-046"
],
"current_release_date": "2025-05-22T13:03:10.000Z",
"generator": {
"date": "2025-04-01T06:22:01.779Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.22"
}
},
"id": "VDE-2022-046",
"initial_release_date": "2022-11-10T07:00:00.000Z",
"revision_history": [
{
"date": "2022-10-11T06:00:00.000Z",
"number": "1",
"summary": "Initial revision."
},
{
"date": "2022-11-24T07:51:00.000Z",
"number": "2",
"summary": "Update A"
},
{
"date": "2025-05-22T13:03:10.000Z",
"number": "3",
"summary": "Fix: quotation mark"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "AXC F 1152",
"product": {
"name": "AXC F 1152",
"product_id": "CSAFPID-11001",
"product_identification_helper": {
"model_numbers": [
"1151412"
]
}
}
},
{
"category": "product_name",
"name": "AXC F 2152",
"product": {
"name": "AXC F 2152",
"product_id": "CSAFPID-11002",
"product_identification_helper": {
"model_numbers": [
"2404267"
]
}
}
},
{
"category": "product_name",
"name": "AXC F 3152",
"product": {
"name": "AXC F 3152",
"product_id": "CSAFPID-11003",
"product_identification_helper": {
"model_numbers": [
"1069208"
]
}
}
},
{
"category": "product_name",
"name": "BPC 9102S",
"product": {
"name": "BPC 9102S",
"product_id": "CSAFPID-11004",
"product_identification_helper": {
"model_numbers": [
"1246285"
]
}
}
},
{
"category": "product_name",
"name": "ENERGY AXC PU",
"product": {
"name": "ENERGY AXC PU",
"product_id": "CSAFPID-11005",
"product_identification_helper": {
"model_numbers": [
"1264327"
]
}
}
},
{
"category": "product_name",
"name": "EPC 1502",
"product": {
"name": "EPC 1502",
"product_id": "CSAFPID-11006",
"product_identification_helper": {
"model_numbers": [
"1185416"
]
}
}
},
{
"category": "product_name",
"name": "EPC 1522",
"product": {
"name": "EPC 1522",
"product_id": "CSAFPID-11007",
"product_identification_helper": {
"model_numbers": [
"1185423"
]
}
}
},
{
"category": "product_name",
"name": "RFC 4072S",
"product": {
"name": "RFC 4072S",
"product_id": "CSAFPID-11008",
"product_identification_helper": {
"model_numbers": [
"1051328"
]
}
}
},
{
"category": "product_name",
"name": "SMARTRTU AXC SG",
"product": {
"name": "SMARTRTU AXC SG",
"product_id": "CSAFPID-11009",
"product_identification_helper": {
"model_numbers": [
"1110435"
]
}
}
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2022.0.8 LTS",
"product": {
"name": "Firmware \u003c2022.0.8 LTS",
"product_id": "CSAFPID-21001"
}
},
{
"category": "product_version_range",
"name": "\u003cV04.14.00.00",
"product": {
"name": "Firmware \u003cV04.14.00.00",
"product_id": "CSAFPID-21002"
}
},
{
"category": "product_version_range",
"name": "\u003c2022.0.7 LTS",
"product": {
"name": "Firmware \u003c2022.0.7 LTS",
"product_id": "CSAFPID-21003"
}
},
{
"category": "product_version_range",
"name": "\u003cV01.09.00.00",
"product": {
"name": "Firmware \u003cV01.09.00.00",
"product_id": "CSAFPID-21004"
}
},
{
"category": "product_version",
"name": "2022.0.8 LTS",
"product": {
"name": "Firmware 2022.0.8 LTS",
"product_id": "CSAFPID-22001"
}
},
{
"category": "product_version",
"name": "V04.14.00.00",
"product": {
"name": "Firmware V04.14.00.00",
"product_id": "CSAFPID-22002"
}
},
{
"category": "product_version",
"name": "2022.0.7 LTS",
"product": {
"name": "Firmware 2022.0.7 LTS",
"product_id": "CSAFPID-22003"
}
},
{
"category": "product_version",
"name": "V01.09.00.00",
"product": {
"name": "Firmware V01.09.00.00",
"product_id": "CSAFPID-22004"
}
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "PHOENIX CONTACT"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
],
"summary": "Affected Products."
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"summary": "Fixed Products."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2022.0.8 LTS installed on AXC F 1152",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2022.0.8 LTS installed on AXC F 1152",
"product_id": "CSAFPID-32001"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2022.0.8 LTS installed on AXC F 2152",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2022.0.8 LTS installed on AXC F 2152",
"product_id": "CSAFPID-32002"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2022.0.8 LTS installed on AXC F 3152",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2022.0.8 LTS installed on AXC F 3152",
"product_id": "CSAFPID-32003"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2022.0.8 LTS installed on BPC 9102S",
"product_id": "CSAFPID-31004"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2022.0.8 LTS installed on BPC 9102S",
"product_id": "CSAFPID-32004"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003cV04.14.00.00 installed on ENERGY AXC PU",
"product_id": "CSAFPID-31005"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V04.14.00.00 installed on ENERGY AXC PU",
"product_id": "CSAFPID-32005"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2022.0.7 LTS installed on EPC 1502",
"product_id": "CSAFPID-31006"
},
"product_reference": "CSAFPID-21003",
"relates_to_product_reference": "CSAFPID-11006"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2022.0.7 LTS installed on EPC 1502",
"product_id": "CSAFPID-32006"
},
"product_reference": "CSAFPID-22003",
"relates_to_product_reference": "CSAFPID-11006"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2022.0.7 LTS installed on EPC 1522",
"product_id": "CSAFPID-31007"
},
"product_reference": "CSAFPID-21003",
"relates_to_product_reference": "CSAFPID-11007"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2022.0.7 LTS installed on EPC 1522",
"product_id": "CSAFPID-32007"
},
"product_reference": "CSAFPID-22003",
"relates_to_product_reference": "CSAFPID-11007"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2022.0.8 LTS installed on RFC 4072S",
"product_id": "CSAFPID-31008"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11008"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2022.0.8 LTS installed on RFC 4072S",
"product_id": "CSAFPID-32008"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11008"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003cV01.09.00.00 installed on SMARTRTU AXC SG",
"product_id": "CSAFPID-31009"
},
"product_reference": "CSAFPID-21004",
"relates_to_product_reference": "CSAFPID-11009"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V01.09.00.00 installed on SMARTRTU AXC SG",
"product_id": "CSAFPID-32009"
},
"product_reference": "CSAFPID-22004",
"relates_to_product_reference": "CSAFPID-11009"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-29824",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don\u0027t check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2\u0027s buffer functions, for example libxslt through 1.1.35, is affected as well.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-29824"
},
{
"cve": "CVE-2022-23308",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-23308"
},
{
"cve": "CVE-2022-28391",
"notes": [
{
"category": "description",
"text": "BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record\u0027s value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal\u0027s colors.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-28391"
},
{
"cve": "CVE-2022-0547",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "description",
"text": "OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-0547"
},
{
"cve": "CVE-2022-1381",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1381"
},
{
"cve": "CVE-2022-1420",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "description",
"text": "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1420"
},
{
"cve": "CVE-2022-1733",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1733"
},
{
"cve": "CVE-2022-1796",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "Use After Free in GitHub repository vim/vim prior to 8.2.4979.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1796"
},
{
"cve": "CVE-2022-1621",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1621"
},
{
"cve": "CVE-2022-1616",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1616"
},
{
"cve": "CVE-2022-25313",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "description",
"text": "In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-25313"
},
{
"cve": "CVE-2021-45117",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "description",
"text": "The OPC autogenerated ANSI C stack stubs (in the NodeSets) do not handle all error cases. This can lead to a NULL pointer dereference.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2021-45117"
},
{
"cve": "CVE-2022-1619",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1619"
},
{
"cve": "CVE-2022-25235",
"cwe": {
"id": "CWE-116",
"name": "Improper Encoding or Escaping of Output"
},
"notes": [
{
"category": "description",
"text": "xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-25235"
},
{
"cve": "CVE-2022-25236",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "description",
"text": "xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-25236"
},
{
"cve": "CVE-2022-1629",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "description",
"text": "Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1629"
},
{
"cve": "CVE-2022-1735",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "description",
"text": "Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1735"
},
{
"cve": "CVE-2022-1769",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "description",
"text": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1769"
},
{
"cve": "CVE-2022-1785",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1785"
},
{
"cve": "CVE-2022-1620",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "description",
"text": "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1620"
},
{
"cve": "CVE-2022-1674",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "description",
"text": "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1674"
},
{
"cve": "CVE-2022-1771",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "description",
"text": "Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1771"
},
{
"cve": "CVE-2022-1886",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1886"
},
{
"cve": "CVE-2022-1851",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "description",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1851"
},
{
"cve": "CVE-2022-1898",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "Use After Free in GitHub repository vim/vim prior to 8.2.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1898"
},
{
"cve": "CVE-2022-1720",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "description",
"text": "Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1720"
},
{
"cve": "CVE-2018-25032",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2018-25032"
},
{
"cve": "CVE-2022-22576",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "description",
"text": "An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.1,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 8.1,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-22576"
},
{
"cve": "CVE-2022-27778",
"cwe": {
"id": "CWE-706",
"name": "Use of Incorrectly-Resolved Name or Reference"
},
"notes": [
{
"category": "description",
"text": "A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when \u0027--no-clobber\u0027 is used together with \u0027--remove-on-error\u0027.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 8.1,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.1,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-27778"
},
{
"cve": "CVE-2022-27779",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "description",
"text": "libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl\u0027s \"cookie engine\" can bebuilt with or without [Public Suffix List](https://publicsuffix.org/)awareness. If PSL support not provided, a more rudimentary check exists to atleast prevent cookies from being set on TLDs. This check was broken if thehost name in the URL uses a trailing dot.This can allow arbitrary sites to set cookies that then would get sent to adifferent and unrelated site or domain.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-27779"
},
{
"cve": "CVE-2022-27782",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "description",
"text": "libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-27782"
},
{
"cve": "CVE-2022-27774",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"notes": [
{
"category": "description",
"text": "An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 5.7,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 5.7,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-27774"
},
{
"cve": "CVE-2022-25314",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-25314"
},
{
"cve": "CVE-2022-25315",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-25315"
},
{
"cve": "CVE-2022-27776",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"notes": [
{
"category": "description",
"text": "A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-27776"
},
{
"cve": "CVE-2022-30115",
"cwe": {
"id": "CWE-319",
"name": "Cleartext Transmission of Sensitive Information"
},
"notes": [
{
"category": "description",
"text": "Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 4.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 4.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-30115"
},
{
"cve": "CVE-2022-27780",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "description",
"text": "The curl URL parser wrongly accepts percent-encoded URL separators like \u0027/\u0027when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like \u0027http://example.com%2F127.0.0.1/\u0027, would be allowed bythe parser and get transposed into \u0027http://example.com/127.0.0.1/\u0027. This flawcan be used to circumvent filters, checks and more.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-27780"
},
{
"cve": "CVE-2022-27781",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "description",
"text": "libcurl provides the \u0027CURLOPT_CERTINFO\u0027 option to allow applications torequest details to be returned about a server\u0027s certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-27781"
},
{
"cve": "CVE-2022-27775",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "description",
"text": "An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-27775"
},
{
"cve": "CVE-2022-32207",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "description",
"text": "When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-32207"
},
{
"cve": "CVE-2022-32206",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "description",
"text": "curl \u003c 7.84.0 supports \"chained\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \"malloc bomb\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32208",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 5.9,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32205",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "description",
"text": "A malicious server can serve excessive amounts of \u0027Set-Cookie:\u0027 headers in a HTTP response to curl and curl \u003c 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven\u0027t expired. Due to cookie matching rules, a server on \u0027foo.example.com\u0027 can set cookies that also would match for \u0027bar.example.com\u0027, making it it possible for a \"sister server\" to effectively cause a denial of service for a sibling site on the same second level domain using this method.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 4.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 4.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-32205"
},
{
"cve": "CVE-2019-19906",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2019-19906"
},
{
"cve": "CVE-2022-24407",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"notes": [
{
"category": "description",
"text": "In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-24407"
},
{
"cve": "CVE-2022-1154",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1154"
},
{
"cve": "CVE-2022-0943",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-0943"
},
{
"cve": "CVE-2022-1160",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "heap buffer overflow in get_one_sourceline in GitHub repository vim/vim prior to 8.2.4647.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1160"
},
{
"cve": "CVE-2022-0729",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "description",
"text": "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-0729"
},
{
"cve": "CVE-2022-0572",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-0572"
},
{
"cve": "CVE-2022-0696",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "description",
"text": "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-0696"
},
{
"cve": "CVE-2022-0685",
"cwe": {
"id": "CWE-823",
"name": "Use of Out-of-range Pointer Offset"
},
"notes": [
{
"category": "description",
"text": "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-0685"
},
{
"cve": "CVE-2022-0714",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-0714"
},
{
"cve": "CVE-2022-0361",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-0361"
},
{
"cve": "CVE-2022-0368",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "description",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-0368"
},
{
"cve": "CVE-2021-3973",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "vim is vulnerable to Heap-based Buffer Overflow",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2021-3973"
},
{
"cve": "CVE-2021-3796",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "vim is vulnerable to Use After Free",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.3,
"environmentalSeverity": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.3,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2021-3796"
},
{
"cve": "CVE-2021-4166",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "description",
"text": "vim is vulnerable to Out-of-bounds Read",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.1,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.1,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2021-4166"
},
{
"cve": "CVE-2022-1927",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "description",
"text": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1927"
},
{
"cve": "CVE-2022-1942",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-1942"
},
{
"cve": "CVE-2022-2129",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2129"
},
{
"cve": "CVE-2022-2175",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "description",
"text": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2175"
},
{
"cve": "CVE-2022-2182",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2182"
},
{
"cve": "CVE-2022-0778",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "description",
"text": "The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-0778"
},
{
"cve": "CVE-2022-2183",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "description",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2183"
},
{
"cve": "CVE-2022-2343",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2343"
},
{
"cve": "CVE-2022-2207",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2207"
},
{
"cve": "CVE-2022-2210",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2210"
},
{
"cve": "CVE-2022-2344",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2344"
},
{
"cve": "CVE-2022-2345",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0046.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2345"
},
{
"cve": "CVE-2022-2208",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "description",
"text": "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2208"
},
{
"cve": "CVE-2022-2231",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "description",
"text": "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2231"
},
{
"cve": "CVE-2022-2287",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "description",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.1,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.1,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2287"
},
{
"cve": "CVE-2022-2285",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "description",
"text": "Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2285"
},
{
"cve": "CVE-2022-2284",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2284"
},
{
"cve": "CVE-2022-2286",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "description",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2286"
},
{
"cve": "CVE-2022-2289",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "description",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2289"
},
{
"cve": "CVE-2022-2288",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "description",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2288"
},
{
"cve": "CVE-2022-2264",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "description",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2264"
},
{
"cve": "CVE-2022-2206",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "description",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2206"
},
{
"cve": "CVE-2022-2257",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "description",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-2257"
},
{
"cve": "CVE-2022-29862",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "description",
"text": "An infinite loop in OPC UA .NET Standard Stack 1.04.368 allows a remote attackers to cause the application to hang via a crafted message.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-29862"
},
{
"cve": "CVE-2022-29864",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "description",
"text": "OPC UA .NET Standard Stack 1.04.368 allows a remote attacker to cause a server to crash via a large number of messages that trigger Uncontrolled Resource Consumption.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:Measures to protect network-capable devices with Ethernet connection",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Update to the latest LTS Firmware Release.Update to the latest LTS PLCnext Engineer Release.Please check Phoenix Contact PSIRT webpage\u00a0for further Updates of this Advisory.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009"
]
}
],
"title": "CVE-2022-29864"
}
]
}
OPENSUSE-SU-2024:12337-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "gvim-9.0.0453-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the gvim-9.0.0453-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12337",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12337-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46059 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0213 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0213/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0261 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0318 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0319 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0351 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0359 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0361 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0368 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0392 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0392/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0407 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0407/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0408 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0408/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0413 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0413/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0554 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0554/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0572 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0572/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0629 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0685 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0729 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0943 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0943/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1154 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1160 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1420 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1420/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1616 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1619 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1620 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1621 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1629 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1674 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1720 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1733 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1733/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1735 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1769 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1769/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1771 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1771/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1785 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1796 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1851 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1851/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1886 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1886/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1897 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1898 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1898/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1927 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1927/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1942 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1968 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1968/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2000 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2042 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2042/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2124 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2125 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2126 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2129 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2175 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2182 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2183 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2206 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2207 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2208 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2210 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2210/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2231 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2264 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2284 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2286 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2286/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2287 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2287/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2288 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2289 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2304 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2343 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2343/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2344 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2344/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2345 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2571 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2571/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2580 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2580/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2581 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2581/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2598 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2816 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2817 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2819 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2849 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2862 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2874 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2889 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2889/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2923 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2946 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2946/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2980 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2982 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3016 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3037 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3153 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3153/"
}
],
"title": "gvim-9.0.0453-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12337-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.0.0453-2.1.aarch64",
"product": {
"name": "gvim-9.0.0453-2.1.aarch64",
"product_id": "gvim-9.0.0453-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "vim-9.0.0453-2.1.aarch64",
"product": {
"name": "vim-9.0.0453-2.1.aarch64",
"product_id": "vim-9.0.0453-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "vim-data-9.0.0453-2.1.aarch64",
"product": {
"name": "vim-data-9.0.0453-2.1.aarch64",
"product_id": "vim-data-9.0.0453-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "vim-data-common-9.0.0453-2.1.aarch64",
"product": {
"name": "vim-data-common-9.0.0453-2.1.aarch64",
"product_id": "vim-data-common-9.0.0453-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "vim-small-9.0.0453-2.1.aarch64",
"product": {
"name": "vim-small-9.0.0453-2.1.aarch64",
"product_id": "vim-small-9.0.0453-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.0.0453-2.1.ppc64le",
"product": {
"name": "gvim-9.0.0453-2.1.ppc64le",
"product_id": "gvim-9.0.0453-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "vim-9.0.0453-2.1.ppc64le",
"product": {
"name": "vim-9.0.0453-2.1.ppc64le",
"product_id": "vim-9.0.0453-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "vim-data-9.0.0453-2.1.ppc64le",
"product": {
"name": "vim-data-9.0.0453-2.1.ppc64le",
"product_id": "vim-data-9.0.0453-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "vim-data-common-9.0.0453-2.1.ppc64le",
"product": {
"name": "vim-data-common-9.0.0453-2.1.ppc64le",
"product_id": "vim-data-common-9.0.0453-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "vim-small-9.0.0453-2.1.ppc64le",
"product": {
"name": "vim-small-9.0.0453-2.1.ppc64le",
"product_id": "vim-small-9.0.0453-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.0.0453-2.1.s390x",
"product": {
"name": "gvim-9.0.0453-2.1.s390x",
"product_id": "gvim-9.0.0453-2.1.s390x"
}
},
{
"category": "product_version",
"name": "vim-9.0.0453-2.1.s390x",
"product": {
"name": "vim-9.0.0453-2.1.s390x",
"product_id": "vim-9.0.0453-2.1.s390x"
}
},
{
"category": "product_version",
"name": "vim-data-9.0.0453-2.1.s390x",
"product": {
"name": "vim-data-9.0.0453-2.1.s390x",
"product_id": "vim-data-9.0.0453-2.1.s390x"
}
},
{
"category": "product_version",
"name": "vim-data-common-9.0.0453-2.1.s390x",
"product": {
"name": "vim-data-common-9.0.0453-2.1.s390x",
"product_id": "vim-data-common-9.0.0453-2.1.s390x"
}
},
{
"category": "product_version",
"name": "vim-small-9.0.0453-2.1.s390x",
"product": {
"name": "vim-small-9.0.0453-2.1.s390x",
"product_id": "vim-small-9.0.0453-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.0.0453-2.1.x86_64",
"product": {
"name": "gvim-9.0.0453-2.1.x86_64",
"product_id": "gvim-9.0.0453-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "vim-9.0.0453-2.1.x86_64",
"product": {
"name": "vim-9.0.0453-2.1.x86_64",
"product_id": "vim-9.0.0453-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "vim-data-9.0.0453-2.1.x86_64",
"product": {
"name": "vim-data-9.0.0453-2.1.x86_64",
"product_id": "vim-data-9.0.0453-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "vim-data-common-9.0.0453-2.1.x86_64",
"product": {
"name": "vim-data-common-9.0.0453-2.1.x86_64",
"product_id": "vim-data-common-9.0.0453-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "vim-small-9.0.0453-2.1.x86_64",
"product": {
"name": "vim-small-9.0.0453-2.1.x86_64",
"product_id": "vim-small-9.0.0453-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64"
},
"product_reference": "gvim-9.0.0453-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le"
},
"product_reference": "gvim-9.0.0453-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x"
},
"product_reference": "gvim-9.0.0453-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64"
},
"product_reference": "gvim-9.0.0453-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64"
},
"product_reference": "vim-9.0.0453-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le"
},
"product_reference": "vim-9.0.0453-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x"
},
"product_reference": "vim-9.0.0453-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64"
},
"product_reference": "vim-9.0.0453-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64"
},
"product_reference": "vim-data-9.0.0453-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le"
},
"product_reference": "vim-data-9.0.0453-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x"
},
"product_reference": "vim-data-9.0.0453-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64"
},
"product_reference": "vim-data-9.0.0453-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64"
},
"product_reference": "vim-data-common-9.0.0453-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le"
},
"product_reference": "vim-data-common-9.0.0453-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x"
},
"product_reference": "vim-data-common-9.0.0453-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64"
},
"product_reference": "vim-data-common-9.0.0453-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64"
},
"product_reference": "vim-small-9.0.0453-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le"
},
"product_reference": "vim-small-9.0.0453-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x"
},
"product_reference": "vim-small-9.0.0453-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
},
"product_reference": "vim-small-9.0.0453-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-46059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46059"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46059",
"url": "https://www.suse.com/security/cve/CVE-2021-46059"
},
{
"category": "external",
"summary": "SUSE Bug 1194556 for CVE-2021-46059",
"url": "https://bugzilla.suse.com/1194556"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46059"
},
{
"cve": "CVE-2022-0213",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0213"
}
],
"notes": [
{
"category": "general",
"text": "vim is vulnerable to Heap-based Buffer Overflow",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0213",
"url": "https://www.suse.com/security/cve/CVE-2022-0213"
},
{
"category": "external",
"summary": "SUSE Bug 1194885 for CVE-2022-0213",
"url": "https://bugzilla.suse.com/1194885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0213"
},
{
"cve": "CVE-2022-0261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0261"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0261",
"url": "https://www.suse.com/security/cve/CVE-2022-0261"
},
{
"category": "external",
"summary": "SUSE Bug 1194872 for CVE-2022-0261",
"url": "https://bugzilla.suse.com/1194872"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0261"
},
{
"cve": "CVE-2022-0318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0318"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0318",
"url": "https://www.suse.com/security/cve/CVE-2022-0318"
},
{
"category": "external",
"summary": "SUSE Bug 1195004 for CVE-2022-0318",
"url": "https://bugzilla.suse.com/1195004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0318"
},
{
"cve": "CVE-2022-0319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0319"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0319",
"url": "https://www.suse.com/security/cve/CVE-2022-0319"
},
{
"category": "external",
"summary": "SUSE Bug 1195066 for CVE-2022-0319",
"url": "https://bugzilla.suse.com/1195066"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-0319"
},
{
"cve": "CVE-2022-0351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0351"
}
],
"notes": [
{
"category": "general",
"text": "Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0351",
"url": "https://www.suse.com/security/cve/CVE-2022-0351"
},
{
"category": "external",
"summary": "SUSE Bug 1195126 for CVE-2022-0351",
"url": "https://bugzilla.suse.com/1195126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-0351"
},
{
"cve": "CVE-2022-0359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0359"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0359",
"url": "https://www.suse.com/security/cve/CVE-2022-0359"
},
{
"category": "external",
"summary": "SUSE Bug 1195203 for CVE-2022-0359",
"url": "https://bugzilla.suse.com/1195203"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0359"
},
{
"cve": "CVE-2022-0361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0361"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0361",
"url": "https://www.suse.com/security/cve/CVE-2022-0361"
},
{
"category": "external",
"summary": "SUSE Bug 1195202 for CVE-2022-0361",
"url": "https://bugzilla.suse.com/1195202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0361"
},
{
"cve": "CVE-2022-0368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0368"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0368",
"url": "https://www.suse.com/security/cve/CVE-2022-0368"
},
{
"category": "external",
"summary": "SUSE Bug 1195205 for CVE-2022-0368",
"url": "https://bugzilla.suse.com/1195205"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0368"
},
{
"cve": "CVE-2022-0392",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0392"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0392",
"url": "https://www.suse.com/security/cve/CVE-2022-0392"
},
{
"category": "external",
"summary": "SUSE Bug 1195332 for CVE-2022-0392",
"url": "https://bugzilla.suse.com/1195332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0392"
},
{
"cve": "CVE-2022-0407",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0407"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0407",
"url": "https://www.suse.com/security/cve/CVE-2022-0407"
},
{
"category": "external",
"summary": "SUSE Bug 1195354 for CVE-2022-0407",
"url": "https://bugzilla.suse.com/1195354"
},
{
"category": "external",
"summary": "SUSE Bug 1208308 for CVE-2022-0407",
"url": "https://bugzilla.suse.com/1208308"
},
{
"category": "external",
"summary": "SUSE Bug 1208649 for CVE-2022-0407",
"url": "https://bugzilla.suse.com/1208649"
},
{
"category": "external",
"summary": "SUSE Bug 1208651 for CVE-2022-0407",
"url": "https://bugzilla.suse.com/1208651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0407"
},
{
"cve": "CVE-2022-0408",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0408"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0408",
"url": "https://www.suse.com/security/cve/CVE-2022-0408"
},
{
"category": "external",
"summary": "SUSE Bug 1195459 for CVE-2022-0408",
"url": "https://bugzilla.suse.com/1195459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0408"
},
{
"cve": "CVE-2022-0413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0413"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0413",
"url": "https://www.suse.com/security/cve/CVE-2022-0413"
},
{
"category": "external",
"summary": "SUSE Bug 1195356 for CVE-2022-0413",
"url": "https://bugzilla.suse.com/1195356"
},
{
"category": "external",
"summary": "SUSE Bug 1208308 for CVE-2022-0413",
"url": "https://bugzilla.suse.com/1208308"
},
{
"category": "external",
"summary": "SUSE Bug 1208651 for CVE-2022-0413",
"url": "https://bugzilla.suse.com/1208651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0413"
},
{
"cve": "CVE-2022-0554",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0554"
}
],
"notes": [
{
"category": "general",
"text": "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0554",
"url": "https://www.suse.com/security/cve/CVE-2022-0554"
},
{
"category": "external",
"summary": "SUSE Bug 1195846 for CVE-2022-0554",
"url": "https://bugzilla.suse.com/1195846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0554"
},
{
"cve": "CVE-2022-0572",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0572"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0572",
"url": "https://www.suse.com/security/cve/CVE-2022-0572"
},
{
"category": "external",
"summary": "SUSE Bug 1196023 for CVE-2022-0572",
"url": "https://bugzilla.suse.com/1196023"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0572"
},
{
"cve": "CVE-2022-0629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0629"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0629",
"url": "https://www.suse.com/security/cve/CVE-2022-0629"
},
{
"category": "external",
"summary": "SUSE Bug 1196226 for CVE-2022-0629",
"url": "https://bugzilla.suse.com/1196226"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0629"
},
{
"cve": "CVE-2022-0685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0685"
}
],
"notes": [
{
"category": "general",
"text": "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0685",
"url": "https://www.suse.com/security/cve/CVE-2022-0685"
},
{
"category": "external",
"summary": "SUSE Bug 1196227 for CVE-2022-0685",
"url": "https://bugzilla.suse.com/1196227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0685"
},
{
"cve": "CVE-2022-0729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0729"
}
],
"notes": [
{
"category": "general",
"text": "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0729",
"url": "https://www.suse.com/security/cve/CVE-2022-0729"
},
{
"category": "external",
"summary": "SUSE Bug 1196437 for CVE-2022-0729",
"url": "https://bugzilla.suse.com/1196437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-0729"
},
{
"cve": "CVE-2022-0943",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0943"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0943",
"url": "https://www.suse.com/security/cve/CVE-2022-0943"
},
{
"category": "external",
"summary": "SUSE Bug 1197225 for CVE-2022-0943",
"url": "https://bugzilla.suse.com/1197225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0943"
},
{
"cve": "CVE-2022-1154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1154"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1154",
"url": "https://www.suse.com/security/cve/CVE-2022-1154"
},
{
"category": "external",
"summary": "SUSE Bug 1197813 for CVE-2022-1154",
"url": "https://bugzilla.suse.com/1197813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1154"
},
{
"cve": "CVE-2022-1160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1160"
}
],
"notes": [
{
"category": "general",
"text": "heap buffer overflow in get_one_sourceline in GitHub repository vim/vim prior to 8.2.4647.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1160",
"url": "https://www.suse.com/security/cve/CVE-2022-1160"
},
{
"category": "external",
"summary": "SUSE Bug 1197814 for CVE-2022-1160",
"url": "https://bugzilla.suse.com/1197814"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1160"
},
{
"cve": "CVE-2022-1420",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1420"
}
],
"notes": [
{
"category": "general",
"text": "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1420",
"url": "https://www.suse.com/security/cve/CVE-2022-1420"
},
{
"category": "external",
"summary": "SUSE Bug 1198748 for CVE-2022-1420",
"url": "https://bugzilla.suse.com/1198748"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1420"
},
{
"cve": "CVE-2022-1616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1616"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1616",
"url": "https://www.suse.com/security/cve/CVE-2022-1616"
},
{
"category": "external",
"summary": "SUSE Bug 1199331 for CVE-2022-1616",
"url": "https://bugzilla.suse.com/1199331"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1616"
},
{
"cve": "CVE-2022-1619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1619"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1619",
"url": "https://www.suse.com/security/cve/CVE-2022-1619"
},
{
"category": "external",
"summary": "SUSE Bug 1199333 for CVE-2022-1619",
"url": "https://bugzilla.suse.com/1199333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1619"
},
{
"cve": "CVE-2022-1620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1620"
}
],
"notes": [
{
"category": "general",
"text": "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1620",
"url": "https://www.suse.com/security/cve/CVE-2022-1620"
},
{
"category": "external",
"summary": "SUSE Bug 1199334 for CVE-2022-1620",
"url": "https://bugzilla.suse.com/1199334"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1620"
},
{
"cve": "CVE-2022-1621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1621"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1621",
"url": "https://www.suse.com/security/cve/CVE-2022-1621"
},
{
"category": "external",
"summary": "SUSE Bug 1199435 for CVE-2022-1621",
"url": "https://bugzilla.suse.com/1199435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1621"
},
{
"cve": "CVE-2022-1629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1629"
}
],
"notes": [
{
"category": "general",
"text": "Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1629",
"url": "https://www.suse.com/security/cve/CVE-2022-1629"
},
{
"category": "external",
"summary": "SUSE Bug 1199436 for CVE-2022-1629",
"url": "https://bugzilla.suse.com/1199436"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1629"
},
{
"cve": "CVE-2022-1674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1674"
}
],
"notes": [
{
"category": "general",
"text": "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1674",
"url": "https://www.suse.com/security/cve/CVE-2022-1674"
},
{
"category": "external",
"summary": "SUSE Bug 1199502 for CVE-2022-1674",
"url": "https://bugzilla.suse.com/1199502"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1674"
},
{
"cve": "CVE-2022-1720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1720"
}
],
"notes": [
{
"category": "general",
"text": "Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1720",
"url": "https://www.suse.com/security/cve/CVE-2022-1720"
},
{
"category": "external",
"summary": "SUSE Bug 1200732 for CVE-2022-1720",
"url": "https://bugzilla.suse.com/1200732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1720"
},
{
"cve": "CVE-2022-1733",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1733"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1733",
"url": "https://www.suse.com/security/cve/CVE-2022-1733"
},
{
"category": "external",
"summary": "SUSE Bug 1199655 for CVE-2022-1733",
"url": "https://bugzilla.suse.com/1199655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1733"
},
{
"cve": "CVE-2022-1735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1735"
}
],
"notes": [
{
"category": "general",
"text": "Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1735",
"url": "https://www.suse.com/security/cve/CVE-2022-1735"
},
{
"category": "external",
"summary": "SUSE Bug 1199651 for CVE-2022-1735",
"url": "https://bugzilla.suse.com/1199651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1735"
},
{
"cve": "CVE-2022-1769",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1769"
}
],
"notes": [
{
"category": "general",
"text": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1769",
"url": "https://www.suse.com/security/cve/CVE-2022-1769"
},
{
"category": "external",
"summary": "SUSE Bug 1199658 for CVE-2022-1769",
"url": "https://bugzilla.suse.com/1199658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1769"
},
{
"cve": "CVE-2022-1771",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1771"
}
],
"notes": [
{
"category": "general",
"text": "Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1771",
"url": "https://www.suse.com/security/cve/CVE-2022-1771"
},
{
"category": "external",
"summary": "SUSE Bug 1199693 for CVE-2022-1771",
"url": "https://bugzilla.suse.com/1199693"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1771"
},
{
"cve": "CVE-2022-1785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1785"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1785",
"url": "https://www.suse.com/security/cve/CVE-2022-1785"
},
{
"category": "external",
"summary": "SUSE Bug 1199745 for CVE-2022-1785",
"url": "https://bugzilla.suse.com/1199745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1785"
},
{
"cve": "CVE-2022-1796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1796"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 8.2.4979.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1796",
"url": "https://www.suse.com/security/cve/CVE-2022-1796"
},
{
"category": "external",
"summary": "SUSE Bug 1199747 for CVE-2022-1796",
"url": "https://bugzilla.suse.com/1199747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1796"
},
{
"cve": "CVE-2022-1851",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1851"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1851",
"url": "https://www.suse.com/security/cve/CVE-2022-1851"
},
{
"category": "external",
"summary": "SUSE Bug 1199936 for CVE-2022-1851",
"url": "https://bugzilla.suse.com/1199936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1851"
},
{
"cve": "CVE-2022-1886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1886"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1886",
"url": "https://www.suse.com/security/cve/CVE-2022-1886"
},
{
"category": "external",
"summary": "SUSE Bug 1199969 for CVE-2022-1886",
"url": "https://bugzilla.suse.com/1199969"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1886"
},
{
"cve": "CVE-2022-1897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1897"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1897",
"url": "https://www.suse.com/security/cve/CVE-2022-1897"
},
{
"category": "external",
"summary": "SUSE Bug 1200010 for CVE-2022-1897",
"url": "https://bugzilla.suse.com/1200010"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1897"
},
{
"cve": "CVE-2022-1898",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1898"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1898",
"url": "https://www.suse.com/security/cve/CVE-2022-1898"
},
{
"category": "external",
"summary": "SUSE Bug 1200011 for CVE-2022-1898",
"url": "https://bugzilla.suse.com/1200011"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1898"
},
{
"cve": "CVE-2022-1927",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1927"
}
],
"notes": [
{
"category": "general",
"text": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1927",
"url": "https://www.suse.com/security/cve/CVE-2022-1927"
},
{
"category": "external",
"summary": "SUSE Bug 1200012 for CVE-2022-1927",
"url": "https://bugzilla.suse.com/1200012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1927"
},
{
"cve": "CVE-2022-1942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1942"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1942",
"url": "https://www.suse.com/security/cve/CVE-2022-1942"
},
{
"category": "external",
"summary": "SUSE Bug 1200125 for CVE-2022-1942",
"url": "https://bugzilla.suse.com/1200125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1942"
},
{
"cve": "CVE-2022-1968",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1968"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1968",
"url": "https://www.suse.com/security/cve/CVE-2022-1968"
},
{
"category": "external",
"summary": "SUSE Bug 1200270 for CVE-2022-1968",
"url": "https://bugzilla.suse.com/1200270"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1968"
},
{
"cve": "CVE-2022-2000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2000"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2000",
"url": "https://www.suse.com/security/cve/CVE-2022-2000"
},
{
"category": "external",
"summary": "SUSE Bug 1200405 for CVE-2022-2000",
"url": "https://bugzilla.suse.com/1200405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-2000"
},
{
"cve": "CVE-2022-2042",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2042"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2042",
"url": "https://www.suse.com/security/cve/CVE-2022-2042"
},
{
"category": "external",
"summary": "SUSE Bug 1200471 for CVE-2022-2042",
"url": "https://bugzilla.suse.com/1200471"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-2042"
},
{
"cve": "CVE-2022-2124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2124"
}
],
"notes": [
{
"category": "general",
"text": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2124",
"url": "https://www.suse.com/security/cve/CVE-2022-2124"
},
{
"category": "external",
"summary": "SUSE Bug 1200697 for CVE-2022-2124",
"url": "https://bugzilla.suse.com/1200697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2124"
},
{
"cve": "CVE-2022-2125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2125"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2125",
"url": "https://www.suse.com/security/cve/CVE-2022-2125"
},
{
"category": "external",
"summary": "SUSE Bug 1200698 for CVE-2022-2125",
"url": "https://bugzilla.suse.com/1200698"
},
{
"category": "external",
"summary": "SUSE Bug 1205395 for CVE-2022-2125",
"url": "https://bugzilla.suse.com/1205395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2125"
},
{
"cve": "CVE-2022-2126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2126"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2126",
"url": "https://www.suse.com/security/cve/CVE-2022-2126"
},
{
"category": "external",
"summary": "SUSE Bug 1200700 for CVE-2022-2126",
"url": "https://bugzilla.suse.com/1200700"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2126"
},
{
"cve": "CVE-2022-2129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2129"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2129",
"url": "https://www.suse.com/security/cve/CVE-2022-2129"
},
{
"category": "external",
"summary": "SUSE Bug 1200701 for CVE-2022-2129",
"url": "https://bugzilla.suse.com/1200701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2129"
},
{
"cve": "CVE-2022-2175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2175"
}
],
"notes": [
{
"category": "general",
"text": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2175",
"url": "https://www.suse.com/security/cve/CVE-2022-2175"
},
{
"category": "external",
"summary": "SUSE Bug 1200904 for CVE-2022-2175",
"url": "https://bugzilla.suse.com/1200904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2175"
},
{
"cve": "CVE-2022-2182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2182"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2182",
"url": "https://www.suse.com/security/cve/CVE-2022-2182"
},
{
"category": "external",
"summary": "SUSE Bug 1200903 for CVE-2022-2182",
"url": "https://bugzilla.suse.com/1200903"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2182"
},
{
"cve": "CVE-2022-2183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2183"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2183",
"url": "https://www.suse.com/security/cve/CVE-2022-2183"
},
{
"category": "external",
"summary": "SUSE Bug 1200902 for CVE-2022-2183",
"url": "https://bugzilla.suse.com/1200902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2183"
},
{
"cve": "CVE-2022-2206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2206"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2206",
"url": "https://www.suse.com/security/cve/CVE-2022-2206"
},
{
"category": "external",
"summary": "SUSE Bug 1201155 for CVE-2022-2206",
"url": "https://bugzilla.suse.com/1201155"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2206"
},
{
"cve": "CVE-2022-2207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2207"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2207",
"url": "https://www.suse.com/security/cve/CVE-2022-2207"
},
{
"category": "external",
"summary": "SUSE Bug 1201153 for CVE-2022-2207",
"url": "https://bugzilla.suse.com/1201153"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2207"
},
{
"cve": "CVE-2022-2208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2208"
}
],
"notes": [
{
"category": "general",
"text": "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2208",
"url": "https://www.suse.com/security/cve/CVE-2022-2208"
},
{
"category": "external",
"summary": "SUSE Bug 1201152 for CVE-2022-2208",
"url": "https://bugzilla.suse.com/1201152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2208"
},
{
"cve": "CVE-2022-2210",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2210"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2210",
"url": "https://www.suse.com/security/cve/CVE-2022-2210"
},
{
"category": "external",
"summary": "SUSE Bug 1201151 for CVE-2022-2210",
"url": "https://bugzilla.suse.com/1201151"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2210"
},
{
"cve": "CVE-2022-2231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2231"
}
],
"notes": [
{
"category": "general",
"text": "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2231",
"url": "https://www.suse.com/security/cve/CVE-2022-2231"
},
{
"category": "external",
"summary": "SUSE Bug 1201150 for CVE-2022-2231",
"url": "https://bugzilla.suse.com/1201150"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2231"
},
{
"cve": "CVE-2022-2264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2264"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2264",
"url": "https://www.suse.com/security/cve/CVE-2022-2264"
},
{
"category": "external",
"summary": "SUSE Bug 1201132 for CVE-2022-2264",
"url": "https://bugzilla.suse.com/1201132"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2264"
},
{
"cve": "CVE-2022-2284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2284"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2284",
"url": "https://www.suse.com/security/cve/CVE-2022-2284"
},
{
"category": "external",
"summary": "SUSE Bug 1201133 for CVE-2022-2284",
"url": "https://bugzilla.suse.com/1201133"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2284"
},
{
"cve": "CVE-2022-2286",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2286"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2286",
"url": "https://www.suse.com/security/cve/CVE-2022-2286"
},
{
"category": "external",
"summary": "SUSE Bug 1201135 for CVE-2022-2286",
"url": "https://bugzilla.suse.com/1201135"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2286"
},
{
"cve": "CVE-2022-2287",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2287"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2287",
"url": "https://www.suse.com/security/cve/CVE-2022-2287"
},
{
"category": "external",
"summary": "SUSE Bug 1201136 for CVE-2022-2287",
"url": "https://bugzilla.suse.com/1201136"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2287"
},
{
"cve": "CVE-2022-2288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2288"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2288",
"url": "https://www.suse.com/security/cve/CVE-2022-2288"
},
{
"category": "external",
"summary": "SUSE Bug 1201137 for CVE-2022-2288",
"url": "https://bugzilla.suse.com/1201137"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2288"
},
{
"cve": "CVE-2022-2289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2289"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2289",
"url": "https://www.suse.com/security/cve/CVE-2022-2289"
},
{
"category": "external",
"summary": "SUSE Bug 1201139 for CVE-2022-2289",
"url": "https://bugzilla.suse.com/1201139"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2289"
},
{
"cve": "CVE-2022-2304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2304"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2304",
"url": "https://www.suse.com/security/cve/CVE-2022-2304"
},
{
"category": "external",
"summary": "SUSE Bug 1201249 for CVE-2022-2304",
"url": "https://bugzilla.suse.com/1201249"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2304"
},
{
"cve": "CVE-2022-2343",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2343"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2343",
"url": "https://www.suse.com/security/cve/CVE-2022-2343"
},
{
"category": "external",
"summary": "SUSE Bug 1201356 for CVE-2022-2343",
"url": "https://bugzilla.suse.com/1201356"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2343"
},
{
"cve": "CVE-2022-2344",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2344"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2344",
"url": "https://www.suse.com/security/cve/CVE-2022-2344"
},
{
"category": "external",
"summary": "SUSE Bug 1201359 for CVE-2022-2344",
"url": "https://bugzilla.suse.com/1201359"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2344"
},
{
"cve": "CVE-2022-2345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2345"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0046.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2345",
"url": "https://www.suse.com/security/cve/CVE-2022-2345"
},
{
"category": "external",
"summary": "SUSE Bug 1201363 for CVE-2022-2345",
"url": "https://bugzilla.suse.com/1201363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2345"
},
{
"cve": "CVE-2022-2571",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2571"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2571",
"url": "https://www.suse.com/security/cve/CVE-2022-2571"
},
{
"category": "external",
"summary": "SUSE Bug 1202046 for CVE-2022-2571",
"url": "https://bugzilla.suse.com/1202046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2571"
},
{
"cve": "CVE-2022-2580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2580"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2580",
"url": "https://www.suse.com/security/cve/CVE-2022-2580"
},
{
"category": "external",
"summary": "SUSE Bug 1202049 for CVE-2022-2580",
"url": "https://bugzilla.suse.com/1202049"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2580"
},
{
"cve": "CVE-2022-2581",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2581"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2581",
"url": "https://www.suse.com/security/cve/CVE-2022-2581"
},
{
"category": "external",
"summary": "SUSE Bug 1202050 for CVE-2022-2581",
"url": "https://bugzilla.suse.com/1202050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2581"
},
{
"cve": "CVE-2022-2598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2598"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2598",
"url": "https://www.suse.com/security/cve/CVE-2022-2598"
},
{
"category": "external",
"summary": "SUSE Bug 1202051 for CVE-2022-2598",
"url": "https://bugzilla.suse.com/1202051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2598"
},
{
"cve": "CVE-2022-2816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2816"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2816",
"url": "https://www.suse.com/security/cve/CVE-2022-2816"
},
{
"category": "external",
"summary": "SUSE Bug 1202421 for CVE-2022-2816",
"url": "https://bugzilla.suse.com/1202421"
},
{
"category": "external",
"summary": "SUSE Bug 1203576 for CVE-2022-2816",
"url": "https://bugzilla.suse.com/1203576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2816"
},
{
"cve": "CVE-2022-2817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2817"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0213.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2817",
"url": "https://www.suse.com/security/cve/CVE-2022-2817"
},
{
"category": "external",
"summary": "SUSE Bug 1202420 for CVE-2022-2817",
"url": "https://bugzilla.suse.com/1202420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2817"
},
{
"cve": "CVE-2022-2819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2819"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0211.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2819",
"url": "https://www.suse.com/security/cve/CVE-2022-2819"
},
{
"category": "external",
"summary": "SUSE Bug 1202414 for CVE-2022-2819",
"url": "https://bugzilla.suse.com/1202414"
},
{
"category": "external",
"summary": "SUSE Bug 1203576 for CVE-2022-2819",
"url": "https://bugzilla.suse.com/1203576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2819"
},
{
"cve": "CVE-2022-2849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2849"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2849",
"url": "https://www.suse.com/security/cve/CVE-2022-2849"
},
{
"category": "external",
"summary": "SUSE Bug 1202512 for CVE-2022-2849",
"url": "https://bugzilla.suse.com/1202512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2849"
},
{
"cve": "CVE-2022-2862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2862"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0221.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2862",
"url": "https://www.suse.com/security/cve/CVE-2022-2862"
},
{
"category": "external",
"summary": "SUSE Bug 1202511 for CVE-2022-2862",
"url": "https://bugzilla.suse.com/1202511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2862"
},
{
"cve": "CVE-2022-2874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2874"
}
],
"notes": [
{
"category": "general",
"text": "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2874",
"url": "https://www.suse.com/security/cve/CVE-2022-2874"
},
{
"category": "external",
"summary": "SUSE Bug 1202552 for CVE-2022-2874",
"url": "https://bugzilla.suse.com/1202552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2874"
},
{
"cve": "CVE-2022-2889",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2889"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0225.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2889",
"url": "https://www.suse.com/security/cve/CVE-2022-2889"
},
{
"category": "external",
"summary": "SUSE Bug 1202599 for CVE-2022-2889",
"url": "https://bugzilla.suse.com/1202599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2889"
},
{
"cve": "CVE-2022-2923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2923"
}
],
"notes": [
{
"category": "general",
"text": "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2923",
"url": "https://www.suse.com/security/cve/CVE-2022-2923"
},
{
"category": "external",
"summary": "SUSE Bug 1202687 for CVE-2022-2923",
"url": "https://bugzilla.suse.com/1202687"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2923"
},
{
"cve": "CVE-2022-2946",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2946"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0246.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2946",
"url": "https://www.suse.com/security/cve/CVE-2022-2946"
},
{
"category": "external",
"summary": "SUSE Bug 1202689 for CVE-2022-2946",
"url": "https://bugzilla.suse.com/1202689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2946"
},
{
"cve": "CVE-2022-2980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2980"
}
],
"notes": [
{
"category": "general",
"text": "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2980",
"url": "https://www.suse.com/security/cve/CVE-2022-2980"
},
{
"category": "external",
"summary": "SUSE Bug 1203155 for CVE-2022-2980",
"url": "https://bugzilla.suse.com/1203155"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2980"
},
{
"cve": "CVE-2022-2982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2982"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0260.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2982",
"url": "https://www.suse.com/security/cve/CVE-2022-2982"
},
{
"category": "external",
"summary": "SUSE Bug 1203152 for CVE-2022-2982",
"url": "https://bugzilla.suse.com/1203152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2982"
},
{
"cve": "CVE-2022-3016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3016"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0286.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3016",
"url": "https://www.suse.com/security/cve/CVE-2022-3016"
},
{
"category": "external",
"summary": "SUSE Bug 1202862 for CVE-2022-3016",
"url": "https://bugzilla.suse.com/1202862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-3016"
},
{
"cve": "CVE-2022-3037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3037"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0322.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3037",
"url": "https://www.suse.com/security/cve/CVE-2022-3037"
},
{
"category": "external",
"summary": "SUSE Bug 1202962 for CVE-2022-3037",
"url": "https://bugzilla.suse.com/1202962"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-3037"
},
{
"cve": "CVE-2022-3153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3153"
}
],
"notes": [
{
"category": "general",
"text": "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3153",
"url": "https://www.suse.com/security/cve/CVE-2022-3153"
},
{
"category": "external",
"summary": "SUSE Bug 1203272 for CVE-2022-3153",
"url": "https://bugzilla.suse.com/1203272"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-3153"
}
]
}
GSD-2022-1154
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-1154",
"description": "Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.",
"id": "GSD-2022-1154",
"references": [
"https://security.archlinux.org/CVE-2022-1154",
"https://www.suse.com/security/cve/CVE-2022-1154.html",
"https://access.redhat.com/errata/RHSA-2022:1552",
"https://alas.aws.amazon.com/cve/html/CVE-2022-1154.html",
"https://advisories.mageia.org/CVE-2022-1154.html",
"https://linux.oracle.com/cve/CVE-2022-1154.html",
"https://ubuntu.com/security/CVE-2022-1154",
"https://access.redhat.com/errata/RHSA-2022:5242"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-1154"
],
"details": "Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.",
"id": "GSD-2022-1154",
"modified": "2023-12-13T01:19:28.355115Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-1154",
"STATE": "PUBLIC",
"TITLE": "Use after free in utf_ptr2char in vim/vim"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "vim/vim",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "8.2.4646"
}
]
}
}
]
},
"vendor_name": "vim"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-416 Use After Free"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425"
},
{
"name": "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5",
"refsource": "MISC",
"url": "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5"
},
{
"name": "FEDORA-2022-d776fcfe60",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/"
},
{
"name": "FEDORA-2022-e62adccfca",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/"
},
{
"name": "[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"name": "GLSA-202208-32",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"name": "[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html"
},
{
"name": "GLSA-202305-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202305-16"
}
]
},
"source": {
"advisory": "7f0ec6bc-ea0e-45b0-8128-caac72d23425",
"discovery": "EXTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.2.4646",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-1154"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425",
"refsource": "CONFIRM",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425"
},
{
"name": "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5"
},
{
"name": "FEDORA-2022-d776fcfe60",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/"
},
{
"name": "FEDORA-2022-e62adccfca",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/"
},
{
"name": "[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html"
},
{
"name": "N/A",
"refsource": "N/A",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"name": "GLSA-202208-32",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"name": "[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html"
},
{
"name": "GLSA-202305-16",
"refsource": "GENTOO",
"tags": [],
"url": "https://security.gentoo.org/glsa/202305-16"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-05-03T12:15Z",
"publishedDate": "2022-03-30T12:15Z"
}
}
}
GHSA-WM74-7G5X-VQ4X
Vulnerability from github – Published: 2022-03-31 00:00 – Updated: 2022-04-05 00:00Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.
{
"affected": [],
"aliases": [
"CVE-2022-1154"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-03-30T12:15:00Z",
"severity": "CRITICAL"
},
"details": "Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.",
"id": "GHSA-wm74-7g5x-vq4x",
"modified": "2022-04-05T00:00:37Z",
"published": "2022-03-31T00:00:23Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154"
},
{
"type": "WEB",
"url": "https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5"
},
{
"type": "WEB",
"url": "https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202305-16"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
MSRC_CVE-2022-1154
Vulnerability from csaf_microsoft - Published: 2022-03-02 00:00 - Updated: 2022-04-05 00:00Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1154 Use after free in utf_ptr2char in vim/vim - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2022-1154.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Use after free in utf_ptr2char in vim/vim",
"tracking": {
"current_release_date": "2022-04-05T00:00:00.000Z",
"generator": {
"date": "2025-10-19T23:23:33.121Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2022-1154",
"initial_release_date": "2022-03-02T00:00:00.000Z",
"revision_history": [
{
"date": "2022-04-05T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 vim 8.2.4763-1",
"product": {
"name": "\u003ccm1 vim 8.2.4763-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cm1 vim 8.2.4763-1",
"product": {
"name": "cm1 vim 8.2.4763-1",
"product_id": "18741"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 vim 8.2.4743-1",
"product": {
"name": "\u003ccbl2 vim 8.2.4743-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 vim 8.2.4743-1",
"product": {
"name": "cbl2 vim 8.2.4743-1",
"product_id": "18758"
}
}
],
"category": "product_name",
"name": "vim"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 vim 8.2.4763-1 as a component of CBL Mariner 1.0",
"product_id": "16820-2"
},
"product_reference": "2",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 vim 8.2.4763-1 as a component of CBL Mariner 1.0",
"product_id": "18741-16820"
},
"product_reference": "18741",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 vim 8.2.4743-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 vim 8.2.4743-1 as a component of CBL Mariner 2.0",
"product_id": "18758-17086"
},
"product_reference": "18758",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1154",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "general",
"text": "@huntrdev",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"18741-16820",
"18758-17086"
],
"known_affected": [
"16820-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1154 Use after free in utf_ptr2char in vim/vim - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2022-1154.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2022-04-05T00:00:00.000Z",
"details": "8.2.4763-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2022-04-05T00:00:00.000Z",
"details": "8.2.4743-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"16820-2",
"17086-1"
]
}
],
"title": "Use after free in utf_ptr2char in vim/vim"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.